This page was not yet optimized for use on mobile devices.
Philips P5CC036V1C and P5CC009V1C Secure Smart Card Controller
CSV information ?
Status | archived |
---|---|
Valid from | 11.11.2004 |
Valid until | 01.09.2019 |
Scheme | 🇩🇪 DE |
Manufacturer | Philips Semiconductors GmbH |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VLA.4, AVA_MSU.3, EAL5+, ALC_DVS.2 |
Heuristics summary ?
Certificate ID: BSI-DSZ-CC-0244-2004
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEARandomness
RNGEngines
SmartMXVendor
PhilipsSecurity level
EAL4, EAL 5, EAL 1, EAL 7, EAL 4, EAL5+, EAL5, EAL1, EAL3, EAL7, EAL2, EAL6, EAL 5 augmented, EAL5 augmentedClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA.1, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_COP.1, FCS_RND.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_ITT.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_LIM.1, FMT_LIM.2, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FRU_FLT.2Protection profiles
BSI-PP-0002-2001, BSI-PP- 0002-2001, BSI-PP-0002-Certificates
BSI-DSZ-CC-0244-2004, BSI-DSZ-CC-0231-2004, BSI-DSZ-CC-0232-2004, BSI-DSZ-CC-0244, CC-0244Side-channel analysis
physical probing, side channel, DPA, timing attacks, physical tamperingCertification process
2004, Evaluation of the Philips P5CC036V1C Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0244, Version 1.0, 15 October 2004, Evaluation of Philips, Technical Report, Philips P5CC036V1C Secure Smart Card Controller, Version 1.0, 19 October 2004 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German, to AIS 36, Version 1.0, 15 October 2004 for Philips P5CC036V1C Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CC036, BSI-DSZ- CC-0244, Version 1.1, Semiconductors, 30 September 2004 (confidential document) [12] Data Sheet, P5CC036, SmartMX, Secure Smart Card Controller, Objective Specification, Philips, Revision 3.0, 21 September 2004 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD, Mai 2001 [15] Configuration List for the P5CC036V1C, BSI-DSZ-CC-0244, Version 1.0, 12 October 2004 (confidential document) [16] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification, Card Controller, Objective Specification, Philips Semiconductors, Revision 3.0, 21 September 2004 (confidential document) BSI-DSZ-CC-0244-2004 Certification Report C-1 C Excerpts from the Criteria CC Part 1: Caveats onStandards
FIPS PUB 46-3, FIPS PUB 197, AIS 32, AIS 36, AIS 34, AIS 25, AIS 26, AIS 31, AIS31, ISO/IEC 15408:1999, ISO/IEC15408: 1999Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
Title | 0244a.PDF |
---|---|
Author | BSI |
Creation date | D:20041112114010 |
Modification date | D:20041112114454+01'00' |
Pages | 48 |
Creator | Microsoft Word - 0244a.doc |
Producer | Acrobat PDFWriter 4.0 für Windows NT |
Frontpage
Certificate ID | BSI-DSZ-CC-0244-2004 |
---|---|
Certified item | Philips P5CC036V1C and P5CC009V1C Secure Smart Card Controller |
Certification lab | BSI |
Developer | Philips Semiconductors GmbH Business Line Identification |
References
Outgoing- BSI-DSZ-CC-0231-2004 - archived - Philips P5CC009VOM Secure Smart Card Controller
- BSI-DSZ-CC-0232-2004 - archived - Philips P5CC036VOM Secure Smart Card Controller
- BSI-DSZ-CC-0311-2005 - archived - Philips P5CC036V1C and P5CC009V1C with specific IC Dedicated Software Secure Smart Card Controller
Security target ?
Extracted keywords
Symmetric Algorithms
DES, DEA, Triple-DES, TDEA, Triple-DEAAsymmetric Algorithms
ECCRandomness
TRNG, RND, RNGEngines
SmartMXVendor
PhilipsSecurity level
EAL5, EAL 5, EAL4, EAL5+, EAL4+, EAL5 augmented, EAL 5 augmented, EAL4 augmentedClaims
O.RND, O.MF_FW, O.MEM_ACCESS, O.SFR_ACCESS, T.RNDSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ACM_SCP.2, ACM_SCP, ACM_AUT, ACM_CAP, ADO_DEL.2, ADO_IGS.1, ADO_IGS, ADO_DEL, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, ADV_FSP.2, ADV_FSP, ADV_RCR, ADV_SPM, ADV_HLD, ADV_LLD, ADV_INT, ADV_IMP, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VLA.4, AVA_CCA.1, AVA_MSU.3, AVA_SOF.1, AVA_MSUSecurity Functional Requirements (SFR)
FAU_SAS.1, FCS_RND.1, FCS_RND.1.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FCS_CKM, FDP_IFC.1, FDP_ITT.1, FDP_ITC.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FPT_AMT.1, FRU_FLT.2Protection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0244Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injectionStandards
FIPS PUB 46-3, FIPS PUB 46, AIS31File metadata
Title | Security Target |
---|---|
Author | HGA |
Creation date | D:20041018193649+02'00' |
Modification date | D:20041018193728+02'00' |
Pages | 73 |
Creator | Acrobat PDFMaker 6.0 for Word |
Producer | Acrobat Distiller 6.0 (Windows) |
Heuristics ?
Certificate ID: BSI-DSZ-CC-0244-2004
Extracted SARs
ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_CCA.1, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4Similar certificates
Name | Certificate ID | |
---|---|---|
Philips P5CC036V1C and P5CC009V1C with specific IC Dedicated Software Secure Smart Card Controller | BSI-DSZ-CC-0311-2005 | Compare |
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '94eeb7975314f1cb59b5335caefc9b48694016ebba3b1fef4b871f527c48c1e2', 'txt_hash': 'dfd25a11c981738607d23f0ad13cf3a3de7dc92f76e597f40629e333c6c4bdc0'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b07ecc052445509c3655b1929058b405b15a7085e299c6b251a6a9f6d5092ad5', 'txt_hash': '0c652bf6c65f25760668f9476875bcefd2ac88e05ea23b9fdc6e371caaafb4fa'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 198742, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 48, '/Author': 'BSI', '/CreationDate': 'D:20041112114010', '/Creator': 'Microsoft Word - 0244a.doc', '/ModDate': "D:20041112114454+01'00'", '/Producer': 'Acrobat PDFWriter 4.0 für Windows NT', '/Title': '0244a.PDF', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 444125, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 73, '/ModDate': "D:20041018193728+02'00'", '/CreationDate': "D:20041018193649+02'00'", '/Title': 'Security Target', '/Creator': 'Acrobat PDFMaker 6.0 for Word', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'HGA', '/Company': 'Philips Semiconductors BL ID ', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0244-2004', 'cert_item': 'Philips P5CC036V1C and P5CC009V1C Secure Smart Card Controller', 'developer': 'Philips Semiconductors GmbH Business Line Identification', 'cert_lab': 'BSI'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0244-2004': 25, 'BSI-DSZ-CC-0231-2004': 1, 'BSI-DSZ-CC-0232-2004': 1, 'BSI-DSZ-CC-0244': 4}, 'NL': {'CC-0244': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 4, 'BSI-PP- 0002-2001': 1, 'BSI-PP-0002-': 1}}, 'cc_security_level': {'EAL': {'EAL4': 9, 'EAL 5': 1, 'EAL 1': 1, 'EAL 7': 1, 'EAL 4': 1, 'EAL5+': 2, 'EAL5': 9, 'EAL1': 5, 'EAL3': 4, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL 5 augmented': 1, 'EAL5 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_SCP.3': 2, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_DEL': 2, 'ADO_IGS': 2}, 'ADV': {'ADV_FSP.3': 1, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 5, 'ALC_LCD.2': 2, 'ALC_TAT.2': 2, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 4, 'AVA_VLA.4': 5, 'AVA_CCA.1': 1, 'AVA_SOF.1': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 4, 'AVA_VLA': 4, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_COP.1': 1, 'FCS_RND.1': 1}, 'FDP': {'FDP_ACC.1': 3, 'FDP_ACF.1': 3, 'FDP_IFC.1': 1, 'FDP_ITT.1': 1}, 'FMT': {'FMT_MSA.1': 2, 'FMT_MSA.3': 2, 'FMT_SMF.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_ITT.1': 1, 'FPT_PHP.3': 1, 'FPT_SEP.1': 1}, 'FRU': {'FRU_FLT.2': 1}}, 'cc_claims': {'O': {'O.C': 1}, 'R': {'R.O': 1}}, 'vendor': {'Philips': {'Philips': 55}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 6, 'DEA': 1}, '3DES': {'Triple-DES': 13, 'TDEA': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 5}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 6}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'side channel': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 197': 1}, 'BSI': {'AIS 32': 3, 'AIS 36': 6, 'AIS 34': 2, 'AIS 25': 2, 'AIS 26': 3, 'AIS 31': 4, 'AIS31': 1}, 'ISO': {'ISO/IEC 15408:1999': 1, 'ISO/IEC15408: 1999': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'2004, Evaluation of the Philips P5CC036V1C Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0244, Version 1.0, 15 October 2004, Evaluation of Philips': 1, 'Technical Report, Philips P5CC036V1C Secure Smart Card Controller, Version 1.0, 19 October 2004 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German': 1, 'to AIS 36, Version 1.0, 15 October 2004 for Philips P5CC036V1C Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CC036, BSI-DSZ- CC-0244, Version 1.1': 1, 'Semiconductors, 30 September 2004 (confidential document) [12] Data Sheet, P5CC036, SmartMX, Secure Smart Card Controller, Objective Specification, Philips': 1, 'Revision 3.0, 21 September 2004 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD': 1, 'Mai 2001 [15] Configuration List for the P5CC036V1C, BSI-DSZ-CC-0244, Version 1.0, 12 October 2004 (confidential document) [16] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification': 1, 'Card Controller, Objective Specification, Philips Semiconductors, Revision 3.0, 21 September 2004 (confidential document) BSI-DSZ-CC-0244-2004 Certification Report C-1 C Excerpts from the Criteria CC Part 1: Caveats on': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0244': 75}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 3}}, 'cc_security_level': {'EAL': {'EAL5': 35, 'EAL 5': 4, 'EAL4': 4, 'EAL5+': 1, 'EAL4+': 1, 'EAL5 augmented': 1, 'EAL 5 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 2, 'ACM_SCP.3': 5, 'ACM_SCP.2': 4, 'ACM_SCP': 3, 'ACM_AUT': 1, 'ACM_CAP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_IGS': 2, 'ADO_DEL': 2}, 'ADV': {'ADV_FSP.3': 6, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP.2': 4, 'ADV_FSP': 3, 'ADV_RCR': 4, 'ADV_SPM': 1, 'ADV_HLD': 1, 'ADV_LLD': 1, 'ADV_INT': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 2, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.4': 3, 'AVA_CCA.1': 1, 'AVA_MSU.3': 1, 'AVA_SOF.1': 2, 'AVA_MSU': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.1': 5, 'FCS_RND.1.1': 1, 'FCS_COP.1': 13, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 4, 'FCS_CKM.4': 3, 'FCS_CKM': 1}, 'FDP': {'FDP_IFC.1': 10, 'FDP_ITT.1': 6, 'FDP_ITC.1': 4, 'FDP_ACC.1': 33, 'FDP_ACC.1.1': 2, 'FDP_ACF.1': 30, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 3, 'FMT_MSA.2': 4, 'FMT_MSA.3': 22, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1': 29, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 2, 'FMT_SMF.1': 14, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_ITT.1': 6, 'FPT_PHP.3': 7, 'FPT_SEP.1': 6, 'FPT_AMT.1': 1}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3, 'O.MF_FW': 8, 'O.MEM_ACCESS': 8, 'O.SFR_ACCESS': 8}, 'T': {'T.RND': 2}}, 'vendor': {'Philips': {'Philips': 104}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 29, 'DEA': 2}, '3DES': {'Triple-DES': 10, 'TDEA': 3, 'Triple-DEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 11}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 2}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 14, 'Physical Probing': 2, 'physical probing': 1, 'DPA': 1, 'timing attacks': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 10, 'malfunction': 1, 'fault injection': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 46': 1}, 'BSI': {'AIS31': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0244a.pdf
. - The st_filename property was set to
0244b.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0244-2004
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0311-2005']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0311-2005']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0231-2004', 'BSI-DSZ-CC-0232-2004']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0231-2004', 'BSI-DSZ-CC-0232-2004']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0244a.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0244b.pdf
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Philips P5CC036V1C and P5CC009V1C Secure Smart Card Controller was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "f653bae8ff1e7a9b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0244-2004",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ENV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_PPC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_CCA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_DES",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0311-2005"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0231-2004",
"BSI-DSZ-CC-0232-2004"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0311-2005"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0231-2004",
"BSI-DSZ-CC-0232-2004"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Philips Semiconductors GmbH",
"manufacturer_web": "https://www.philips.com/",
"name": "Philips P5CC036V1C and P5CC009V1C Secure Smart Card Controller",
"not_valid_after": "2019-09-01",
"not_valid_before": "2004-11-11",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0244a.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0244-2004",
"cert_item": "Philips P5CC036V1C and P5CC009V1C Secure Smart Card Controller",
"cert_lab": "BSI",
"developer": "Philips Semiconductors GmbH Business Line Identification",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0231-2004": 1,
"BSI-DSZ-CC-0232-2004": 1,
"BSI-DSZ-CC-0244": 4,
"BSI-DSZ-CC-0244-2004": 25
},
"NL": {
"CC-0244": 1
}
},
"cc_claims": {
"O": {
"O.C": 1
},
"R": {
"R.O": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP- 0002-2001": 1,
"BSI-PP-0002-": 1,
"BSI-PP-0002-2001": 4
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 2,
"ACM_CAP": 2,
"ACM_CAP.4": 2,
"ACM_SCP": 2,
"ACM_SCP.3": 2
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 2,
"ADO_IGS": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 2,
"ADV_FSP.3": 1,
"ADV_HLD": 2,
"ADV_HLD.3": 1,
"ADV_IMP": 2,
"ADV_IMP.2": 1,
"ADV_INT": 2,
"ADV_INT.1": 1,
"ADV_LLD": 2,
"ADV_LLD.1": 1,
"ADV_RCR": 2,
"ADV_RCR.2": 1,
"ADV_SPM": 2,
"ADV_SPM.3": 1
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 1,
"AGD_USR": 2,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 5,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_LCD.2": 2,
"ALC_TAT": 2,
"ALC_TAT.2": 2
},
"ASE": {
"ASE_DES.1": 1,
"ASE_ENV.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_PPC.1": 1,
"ASE_REQ.1": 1,
"ASE_SRE.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.2": 1,
"ATE_DPT": 2,
"ATE_DPT.2": 1,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_IND": 2,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA": 2,
"AVA_CCA.1": 1,
"AVA_MSU": 2,
"AVA_MSU.3": 4,
"AVA_SOF": 4,
"AVA_SOF.1": 1,
"AVA_VLA": 4,
"AVA_VLA.2": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 1,
"EAL 5": 1,
"EAL 5 augmented": 1,
"EAL 7": 1,
"EAL1": 5,
"EAL2": 3,
"EAL3": 4,
"EAL4": 9,
"EAL5": 9,
"EAL5 augmented": 2,
"EAL5+": 2,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_COP.1": 1,
"FCS_RND.1": 1
},
"FDP": {
"FDP_ACC.1": 3,
"FDP_ACF.1": 3,
"FDP_IFC.1": 1,
"FDP_ITT.1": 1
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA.1": 2,
"FMT_MSA.3": 2,
"FMT_SMF.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_SEP.1": 1
},
"FRU": {
"FRU_FLT.2": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"2004, Evaluation of the Philips P5CC036V1C Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0244, Version 1.0, 15 October 2004, Evaluation of Philips": 1,
"Card Controller, Objective Specification, Philips Semiconductors, Revision 3.0, 21 September 2004 (confidential document) BSI-DSZ-CC-0244-2004 Certification Report C-1 C Excerpts from the Criteria CC Part 1: Caveats on": 1,
"Mai 2001 [15] Configuration List for the P5CC036V1C, BSI-DSZ-CC-0244, Version 1.0, 12 October 2004 (confidential document) [16] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification": 1,
"Revision 3.0, 21 September 2004 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD": 1,
"Semiconductors, 30 September 2004 (confidential document) [12] Data Sheet, P5CC036, SmartMX, Secure Smart Card Controller, Objective Specification, Philips": 1,
"Technical Report, Philips P5CC036V1C Secure Smart Card Controller, Version 1.0, 19 October 2004 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German": 1,
"to AIS 36, Version 1.0, 15 October 2004 for Philips P5CC036V1C Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CC036, BSI-DSZ- CC-0244, Version 1.1": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX": 6
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 5
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"physical probing": 2,
"side channel": 1,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 3,
"AIS 31": 4,
"AIS 32": 3,
"AIS 34": 2,
"AIS 36": 6,
"AIS31": 1
},
"FIPS": {
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 3
},
"ISO": {
"ISO/IEC 15408:1999": 1,
"ISO/IEC15408: 1999": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"TDEA": 2,
"Triple-DES": 13
},
"DES": {
"DEA": 1,
"DES": 6
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Philips": {
"Philips": 55
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "BSI",
"/CreationDate": "D:20041112114010",
"/Creator": "Microsoft Word - 0244a.doc",
"/ModDate": "D:20041112114454+01\u002700\u0027",
"/Producer": "Acrobat PDFWriter 4.0 f\u00fcr Windows NT",
"/Title": "0244a.PDF",
"pdf_file_size_bytes": 198742,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 48
},
"st_filename": "0244b.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0244": 75
}
},
"cc_claims": {
"O": {
"O.MEM_ACCESS": 8,
"O.MF_FW": 8,
"O.RND": 3,
"O.SFR_ACCESS": 8
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 3
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_AUT.1": 1,
"ACM_CAP": 1,
"ACM_CAP.4": 2,
"ACM_SCP": 3,
"ACM_SCP.2": 4,
"ACM_SCP.3": 5
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 2,
"ADO_IGS": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 3,
"ADV_FSP.2": 4,
"ADV_FSP.3": 6,
"ADV_HLD": 1,
"ADV_HLD.3": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_LLD": 1,
"ADV_LLD.1": 1,
"ADV_RCR": 4,
"ADV_RCR.2": 1,
"ADV_SPM": 1,
"ADV_SPM.3": 1
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 2,
"AGD_USR": 2,
"AGD_USR.1": 2
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_LCD": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.2": 1
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT.2": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA.1": 1,
"AVA_MSU": 2,
"AVA_MSU.3": 1,
"AVA_SOF.1": 2,
"AVA_VLA.4": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 4,
"EAL 5 augmented": 2,
"EAL4": 4,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL5": 35,
"EAL5 augmented": 1,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 4
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 4,
"FCS_CKM.4": 3,
"FCS_COP.1": 13,
"FCS_COP.1.1": 1,
"FCS_RND.1": 5,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC.1": 33,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 30,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 10,
"FDP_ITC.1": 4,
"FDP_ITT.1": 6,
"FDP_SDI.1": 1
},
"FMT": {
"FMT_LIM.1": 3,
"FMT_LIM.2": 3,
"FMT_MSA.1": 29,
"FMT_MSA.1.1": 2,
"FMT_MSA.2": 4,
"FMT_MSA.3": 22,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 8
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS.1": 7,
"FPT_ITT.1": 6,
"FPT_PHP.3": 7,
"FPT_SEP.1": 6
},
"FRU": {
"FRU_FLT.2": 7
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX": 2
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 11
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 10,
"fault injection": 3,
"malfunction": 1,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 14,
"Physical Probing": 2,
"physical probing": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 3
},
"FIPS": {
"FIPS PUB 46": 1,
"FIPS PUB 46-3": 3
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDEA": 3,
"Triple-DEA": 1,
"Triple-DES": 10
},
"DES": {
"DEA": 2,
"DES": 29
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Philips": {
"Philips": 104
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "HGA",
"/Company": "Philips Semiconductors BL ID ",
"/CreationDate": "D:20041018193649+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 6.0 for Word",
"/ModDate": "D:20041018193728+02\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "Security Target",
"pdf_file_size_bytes": 444125,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 73
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0244a.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_MSU.3",
"EAL5+",
"AVA_VLA.4",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0244b.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "94eeb7975314f1cb59b5335caefc9b48694016ebba3b1fef4b871f527c48c1e2",
"txt_hash": "dfd25a11c981738607d23f0ad13cf3a3de7dc92f76e597f40629e333c6c4bdc0"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b07ecc052445509c3655b1929058b405b15a7085e299c6b251a6a9f6d5092ad5",
"txt_hash": "0c652bf6c65f25760668f9476875bcefd2ac88e05ea23b9fdc6e371caaafb4fa"
}
},
"status": "archived"
}