This page was not yet optimized for use on mobile
devices.
Crypto Library V2.7 NXP Smart Card Controller P5CD081V1D and its major configurations
CSV information
| Status | archived |
|---|---|
| Valid from | 19.12.2012 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | NXP Semiconductors Germany GmbH Business Line Identification |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ALC_DVS.2, EAL4+, AVA_VAN.5 |
| Protection profiles | |
| Maintenance updates | Crypto Library V2.7/V2.9 on SmartMX P5Cx081 / CD041 / CD021 / CD016 V1D (04.07.2013) Certification report Security target |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0864-2012
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, 3DESAsymmetric Algorithms
RSA 1024, RSA-CRT, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA1, SHA-224, SHA-256Schemes
Key ExchangeRandomness
PRNG, RNGEngines
SmartMXLibraries
Crypto Library 2.7Vendor
NXP, NXP SemiconductorsSecurity level
EAL 4, EAL 5, EAL1, EAL4, EAL5, EAL5+, EAL6, EAL3, EAL7, EAL2, EAL 4 augmented, ITSEC EvaluationClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_TDS, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV, ATE_DPT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0035-2007Certificates
BSI-DSZ-CC-0864-2012, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0417, BSI-DSZ-CC-0608, BSI-DSZ-CC-0707-2012, BSI-DSZ-CC-0707, BSI-DSZ-CC-S-0003Evaluation facilities
BrightsightSide-channel analysis
physical probing, side channel, side-channel, fault injection, JILCertification process
Target “Crypto Library V2.7 on SmartMX P5Cx081 / CD041/ CD021/ CD016 V1D”, Rev 1.1, 6 Nov 2012 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8, 0, NXP Crypto Library V2.7 on SmartMX P5Cx081/CD041/CD021/CD016 V1D, Brightsight, 13 December 2012 (confidential document) [10] ETR for composite evaluation according to AIS 36, V3.0, NXP Crypto Library V2.7 on SmartMX, V1D, Brightsight, 12 December 2012 (confidential document) [11] List of Configuration Items, Version 1.0, 15 September 2010 (confidential document) [12] UserStandards
FIPS 180-2, AIS 34, AIS 36, AIS 20, AIS 25, AIS 26, AIS 31, AIS 35, AIS 32, AIS 38, ISO/IEC 14888-3, ISO/IEC 15946-1Technical reports
BSI TR-02102, BSI 7125, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0864-2012 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, crypto library" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20130322121000+01'00' |
| Modification date | D:20130325091930+01'00' |
| Pages | 40 |
| Creator | Writer |
| Producer | LibreOffice 3.6 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0864-2012 |
|---|---|
| Certified item | Crypto Library V2.7 NXP Smart Card Controller P5CD081V1D and its major configurations |
| Certification lab | BSI |
| Developer | NXP Semiconductors Germany GmbH |
References
Outgoing- BSI-DSZ-CC-0707-2012 - archived - NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1
- BSI-DSZ-CC-0633-2010 - archived - Crypto Library V2.7 on P5CD081V1A / P5CC081V1A / P5CN081V1A / P5CD041V1A / P5CD021V1A / P5CD016V1A
- BSI-DSZ-CC-0860-2013 - archived - NXP J3D081_M59_DF and J3D081_M61_DF Secure Smart Card Controller Revision 2 of JCOP V2.4.2 R2
Security target
Extracted keywords
Symmetric Algorithms
AES, DEA, DES, 3DES, Triple-DES, TDES, CBC-MACAsymmetric Algorithms
RSA-CRT, ECC, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256Schemes
MAC, Key ExchangeRandomness
TRNG, RND, RNGEngines
SmartMXLibraries
Crypto Library 2.7Block cipher modes
ECB, CBCVendor
NXP Semiconductors, NXPSecurity level
EAL4, EAL 4, EAL5+, EAL4+, EAL4 augmented, EAL 4 augmentedClaims
O.RND, O.HW_AES, O.MF_FW, O.MEM_ACCESS, O.SFR_ACCESS, O.AES, O.RSA, O.ECC, O.ECC_DHKE, O.SHA, O.COPY, O.REUSE, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4.1, FDP_IFC.1, FDP_ITT.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_RIP, FDP_RIP.1.1, FDP_ITT, FDP_ITT.1.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_FLS.1.1, FPT_ITT, FPT_ITT.1.1, FRU_FLT.2Protection profiles
BSI-PP-0035Certificates
BSI-DSZ-CC-0864, BSI-DSZ-CC-0707Side-channel analysis
Leak-Inherent, Physical Probing, side-channel, side channel, SPA, DPA, timing attacks, Timing attacks, Malfunction, malfunction, DFA, fault induction, fault injectionStandards
FIPS PUB 81, FIPS 180-2, FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 180-2, PKCS #1, AIS20, AIS31, ISO/IEC 9797-1, ISO/IEC 14888-3, CCMB-2009-07-004File metadata
| Title | Security Target Lite, Crypto Library V2.7 on SmartMx P5Cx081/ CD041/ CD021/ CD016 V1D |
|---|---|
| Subject | Security Target Lite |
| Keywords | Security Target Lite; Crypto Library; P5Cx081/ CD041/ CD021/ CD016 V1D |
| Author | NXP Semiconductors |
| Creation date | D:20121106114339+01'00' |
| Modification date | D:20121106114606+01'00' |
| Pages | 56 |
| Creator | Acrobat PDFMaker 9.1 for Word |
| Producer | Adobe PDF Library 9.0 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0864-2012Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "f23028179d995bd5",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0864-2012",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-2021-3011"
]
},
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.7"
]
},
"indirect_transitive_cves": {
"_type": "Set",
"elements": [
"CVE-2021-3011"
]
},
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"f6d23054061d72ba"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0860-2013"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0707-2012",
"BSI-DSZ-CC-0633-2010"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0860-2013"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0707-2012",
"BSI-DSZ-CC-0555-2009",
"BSI-DSZ-CC-0633-2010"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2013-07-04",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0864_ma1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0864_ma1b_pdf.pdf",
"maintenance_title": "Crypto Library V2.7/V2.9 on SmartMX P5Cx081 / CD041 / CD021 / CD016 V1D"
}
]
},
"manufacturer": "NXP Semiconductors Germany GmbH Business Line Identification",
"manufacturer_web": "https://www.nxp.com",
"name": "Crypto Library V2.7 NXP Smart Card Controller P5CD081V1D and its major configurations",
"not_valid_after": "2019-09-01",
"not_valid_before": "2012-12-19",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0864a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0864-2012",
"cert_item": "Crypto Library V2.7 NXP Smart Card Controller P5CD081V1D and its major configurations",
"cert_lab": "BSI",
"developer": "NXP Semiconductors Germany GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 14
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
}
},
"RSA": {
"RSA 1024": 1,
"RSA-CRT": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0417": 2,
"BSI-DSZ-CC-0608": 1,
"BSI-DSZ-CC-0633-2010": 3,
"BSI-DSZ-CC-0707": 1,
"BSI-DSZ-CC-0707-2012": 1,
"BSI-DSZ-CC-0864-2012": 21,
"BSI-DSZ-CC-S-0003": 1
}
},
"cc_claims": {
"O": {
"O.C": 2
},
"R": {
"R.O": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 2,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 2,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 7,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 2,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 7,
"EAL 4 augmented": 3,
"EAL 5": 3,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 7,
"EAL5": 7,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"0, NXP Crypto Library V2.7 on SmartMX P5Cx081/CD041/CD021/CD016 V1D, Brightsight, 13 December 2012 (confidential document) [10] ETR for composite evaluation according to AIS 36, V3.0, NXP Crypto Library V2.7 on SmartMX": 1,
"Target \u201cCrypto Library V2.7 on SmartMX P5Cx081 / CD041/ CD021/ CD016 V1D\u201d, Rev 1.1, 6 Nov 2012 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8": 1,
"V1D, Brightsight, 12 December 2012 (confidential document) [11] List of Configuration Items, Version 1.0, 15 September 2010 (confidential document) [12] User": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX": 30
}
},
"crypto_library": {
"Generic": {
"Crypto Library 2.7": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 4
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3,
"SHA1": 1
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 5
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
},
"RNG": {
"RNG": 4
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 2
},
"SCA": {
"physical probing": 1,
"side channel": 3,
"side-channel": 8
},
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 5,
"AIS 38": 1
},
"FIPS": {
"FIPS 180-2": 1
},
"ISO": {
"ISO/IEC 14888-3": 1,
"ISO/IEC 15946-1": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11
}
},
"DES": {
"3DES": {
"3DES": 1,
"Triple-DES": 1
},
"DES": {
"DES": 9
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 19,
"NXP Semiconductors": 12
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20130322121000+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, crypto library\"",
"/ModDate": "D:20130325091930+01\u002700\u0027",
"/Producer": "LibreOffice 3.6",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0864-2012",
"pdf_file_size_bytes": 1214101,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 40
},
"st_filename": "0864b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 57
}
},
"FF": {
"DH": {
"Diffie-Hellman": 10
}
},
"RSA": {
"RSA-CRT": 2
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0707": 1,
"BSI-DSZ-CC-0864": 1
}
},
"cc_claims": {
"O": {
"O.AES": 5,
"O.COPY": 6,
"O.ECC": 5,
"O.ECC_DHKE": 4,
"O.HW_AES": 3,
"O.MEM_ACCESS": 5,
"O.MF_FW": 4,
"O.REUSE": 6,
"O.RND": 12,
"O.RSA": 5,
"O.SFR_ACCESS": 4,
"O.SHA": 5
},
"T": {
"T.RND": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 2,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.2": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 18
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 3,
"EAL 4 augmented": 3,
"EAL4": 26,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL5+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 2
},
"FCS": {
"FCS_CKM.1": 20,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 2,
"FCS_CKM.4": 16,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 42,
"FCS_COP.1.1": 9,
"FCS_RNG.1": 12,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC.1": 6,
"FDP_ACF.1": 5,
"FDP_IFC.1": 24,
"FDP_ITC.1": 10,
"FDP_ITC.2": 10,
"FDP_ITT": 1,
"FDP_ITT.1": 25,
"FDP_ITT.1.1": 1,
"FDP_RIP": 1,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1
},
"FMT": {
"FMT_LIM.1": 2,
"FMT_LIM.2": 2,
"FMT_MSA.1": 5,
"FMT_MSA.3": 5,
"FMT_SMF.1": 3
},
"FPT": {
"FPT_FLS.1": 18,
"FPT_FLS.1.1": 1,
"FPT_ITT": 1,
"FPT_ITT.1": 33,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 7
},
"FRU": {
"FRU_FLT.2": 18
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 23
},
"ECB": {
"ECB": 15
}
},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX": 117
}
},
"crypto_library": {
"Generic": {
"Crypto Library 2.7": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KEX": {
"Key Exchange": 8
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 12
},
"SHA2": {
"SHA-224": 8,
"SHA-256": 9
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 18,
"RNG": 41
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 28,
"Malfunction": 13,
"fault induction": 1,
"fault injection": 1,
"malfunction": 3
},
"SCA": {
"DPA": 18,
"Leak-Inherent": 13,
"Physical Probing": 2,
"SPA": 22,
"Timing attacks": 4,
"side channel": 14,
"side-channel": 9,
"timing attacks": 6
}
},
"standard_id": {
"BSI": {
"AIS20": 2,
"AIS31": 2
},
"CC": {
"CCMB-2009-07-004": 2
},
"FIPS": {
"FIPS 180-2": 2,
"FIPS PUB 180-2": 1,
"FIPS PUB 197": 3,
"FIPS PUB 46-3": 2,
"FIPS PUB 81": 3
},
"ISO": {
"ISO/IEC 14888-3": 1,
"ISO/IEC 9797-1": 2
},
"PKCS": {
"PKCS #1": 6
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 41
}
},
"DES": {
"3DES": {
"3DES": 15,
"TDES": 1,
"Triple-DES": 17
},
"DES": {
"DEA": 1,
"DES": 34
}
},
"constructions": {
"MAC": {
"CBC-MAC": 16
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 78,
"NXP Semiconductors": 32
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "NXP Semiconductors",
"/CreationDate": "D:20121106114339+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 9.1 for Word",
"/Keywords": "Security Target Lite; Crypto Library; P5Cx081/ CD041/ CD021/ CD016 V1D",
"/ModDate": "D:20121106114606+01\u002700\u0027",
"/Producer": "Adobe PDF Library 9.0",
"/Subject": "Security Target Lite",
"/Title": "Security Target Lite, Crypto Library V2.7 on SmartMx P5Cx081/ CD041/ CD021/ CD016 V1D",
"pdf_file_size_bytes": 402488,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]\u0000",
"http://www.nxp.com/\u0000",
"http://www.cacr.math.uwaterloo.ca/hac/\u0000"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 56
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0864a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0864b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f46ad8da2b3d9ece8010ef737e2098e9bdfefab729ba337f17a1da8cb6fe4291",
"txt_hash": "b613976fc81c1c185500e3a0f37058490dbf6ddd1ef835f9b90acc561bd76c11"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "adca0302f6774b2afbacc690705111275b4e453a315ae857e6c223ebd86ead4f",
"txt_hash": "758f7dd40fac143cdb288750e43d35e5a808ead9ab4c50b3e794aad43d1dc8bd"
}
},
"status": "archived"
}