BCM_SPS02 Secure Processing System with IC Dedicated Software Version 1.0
CSV information ?
Status | archived |
---|---|
Valid from | 25.02.2016 |
Valid until | 25.02.2021 |
Scheme | 🇩🇪 DE |
Manufacturer | Broadcom Corporation |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
Protection profiles | |
Maintenance updates | BCM_SPS02 Secure Processing System with IC Dedicated Software Version 002.030 (09.08.2017) Certification report |
BCM_SPS02 Secure Processing System with Firmware version 002.030 (02.12.2016) Certification report Security target | |
BCM_SPS02 Secure Processing System with Firmware version 002.010 or 002.020 (01.06.2016) Certification report Security target | |
BCM_SPS02 Secure Processing System with Firmware version 002.010 or 002.020 (27.07.2016) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, HMACAsymmetric Algorithms
Diffie-Hellman, DSASchemes
Key ExchangeRandomness
TRNG, RNGVendor
BroadcomSecurity level
EAL 5, EAL 4, EAL 1, EAL 2, EAL 5+, EAL 6, EAL5, EAL 3, EAL 7, EAL 5 augmented, EAL5 augmented, ITSEC EvaluationClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMS.5, ALC_TAT.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_DPT.3, ATE_FUN, ATE_IND, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, AVA_VAN.5, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-0915-2016Evaluation facilities
TÜV InformationstechnikSide-channel analysis
Physical Probing, physical probing, SPA, DPA, JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Version 3.3, 2016-01-21, Security Target for the BCM_SPS02, Broadcom Corporation (confidential document) [7] Evaluation Technical Report, Version 1, 2016-02-18, ETR Summary for BCM_SPS02, TÜV, GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, according to AIS 36, Version 1, 2016-02-18, ETR COMP for BCM_SPS02, TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL, List for the BCM_SPS02 with Evaluation Assurance Level EAL5 augmented, Broadcom Corporation (confidential document) [12] Guidance documentation for the TOE, BCM_SPS02 User's Guide, Version 2.14, Broadcom, confidential document) [13] Guidance documentation for the TOE, Datasheet 20211, Version 1.0, 22 March 2015, Broadcom, confidential document) [14] Guidance documentation for the TOE, BCM20211 – Update of FW and Secure OS, Version 1.5, Broadcom Corporation (confidential document) [15] Guidance documentation for the TOE, ARM Architecture v6M Reference Manual, ARMDDI0419C, Rev C, September 2010, Broadcom Corporation (confidential document) 23 / 36 Certification Report BSI-DSZ-CC-0915-2016 This page is intentionally left blank. 24 / 36Standards
AIS31, AIS26, AIS 34, AIS 25, AIS 26, AIS 46, AIS 37, AIS 31, AIS 36, AIS 35, AIS 32, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0915-2016 |
---|---|
Subject | secure processing system |
Keywords | "Common Criteria, Certification, Zertifizierung, EAL 5, Broadcom, memory encryption, SOGIS MRA" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20160310152533+01'00' |
Modification date | D:20160311085504+01'00' |
Pages | 36 |
Creator | Writer |
Producer | LibreOffice 4.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-0915-2016 |
---|---|
Certified item | BCM_SPS02 Secure Processing System with IC Dedicated Software, Version 1.0 |
Certification lab | BSI |
Developer | Broadcom Corporation |
References
IncomingSecurity target ?
Extracted keywords
Symmetric Algorithms
AES, AES128, AES192, AES256, DES, TDES, 3DES, TDEA, HMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECCHash functions
SHA1, SHA256, SHA224, SHA384, SHA512Schemes
MAC, Key Exchange, Key AgreementRandomness
TRNG, RNG, RNDElliptic Curves
secp192r1, secp224r1, secp256r1, secp384r1, secp521r1, brainpoolP192r1, brainpoolP192t1, brainpoolP224r1, brainpoolP224t1, brainpoolP256r1, brainpoolP256t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1Block cipher modes
ECB, CBC, CTR, OFBVendor
BroadcomSecurity level
EAL5, EAL4, EAL5+, EAL 5, EAL5 augmented, EAL4 augmented, EAL 5 augmentedClaims
O.RND, O.TDES, O.AES, O.SHA, O.RSA, O.ECC, O.HMAC, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP, ADV_FSP.4, ADV_FSP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_CMS, ALC_CMS.4, ALC_DVS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_SAS.1.1, FCS_RNG, FCS_RNG.1, FCS_COP, FCS_CKM, FCS_COP.1, FCS_CKM.1, FCS_COP.1.1, FCS_CKM.4, FCS_CKM.4.1, FCS_CKM.1.1, FCS_CKM.2, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_UCT.1, FDP_UIT.1, FDP_ACC, FDP_ACF, FDP_ACC.1, FDP_ACF.1, FDP_SDC.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC.1, FDP_ITC.2, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.4, FDP_IFF.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1.1, FPT_TST.2, FPT_TST, FPT_TST.1, FPT_TST.2.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Side-channel analysis
Physical Probing, physical probing, side channel, side‐channel, DPA, SPA, Malfunction, DFA, JILStandards
FIPS PUB 197, PKCS#1, AIS31, AIS32, AIS 31, RFC3447, RFC 3447File metadata
Title | Microsoft Word - Securtiy_Target_lite_for_BCM_SPS02_v1.0.docx |
---|---|
Subject | Security Target Lite for the BCM_SPS02 Version 1.0 |
Keywords | Broadcom, Security Target, ASIC, SPS02, embedded systems, crypto accelerators, secure processing system, die isolated hard macro, RNG, RSA, AES, TDES, HMAC, Elliptic Curve, secure memory, embedded flash |
Author | Mark Buer |
Creation date | D:20160214132423-08'00' |
Modification date | D:20160308085105-08'00' |
Pages | 94 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 9.5.2 (Windows) |
References
IncomingHeuristics ?
Extracted SARs
ADV_TDS.4, ADV_INT.2, AGD_OPE.1, ASE_REQ.2, ALC_LCD.1, ALC_DEL.1, ASE_ECD.1, ASE_SPD.1, ALC_TAT.2, ADV_FSP.5, ALC_CMS.5, APE_SPD.1, ASE_TSS.1, ASE_OBJ.2, APE_INT.1, APE_OBJ.2, APE_ECD.1, AGD_PRE.1, ATE_COV.2, APE_REQ.2, ASE_INT.1, ADV_SPM.1, ATE_IND.2, ATE_FUN.1, ADV_ARC.1, ALC_CMC.4, AVA_VAN.5, ASE_CCL.1, ATE_DPT.3, APE_CCL.1, ALC_DVS.2, ALC_FLR.3, ADV_IMP.1Similar certificates
References ?
Updates ?
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0', 'JAVA_OC']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b3af4619d497ef0a9cd93c15bcc608ca576eeb7b8c8d047c3a937678e6d0f861', 'txt_hash': '036786466ecfb3683067efe6e695a332d4349beadb9895c04b902fbb855bfbf6'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '70618d63f11aacf4b5679f502761745cdabfdd012939709a9dd2e7703ba23d94', 'txt_hash': '80c4d9ba965f252796be56e3e2324402953175e106ba7e89b17e04687629957a'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1152250, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 36, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20160310152533+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, EAL 5, Broadcom, memory encryption, SOGIS MRA"', '/ModDate': "D:20160311085504+01'00'", '/Producer': 'LibreOffice 4.2', '/Subject': 'secure processing system', '/Title': 'Certification Report BSI-DSZ-CC-0915-2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.sogisportal.eu/', 'https://www.bsi.bund.de/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/AIS', 'http://www.commoncriteriaportal.org/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 698532, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 94, '/Author': 'Mark Buer', '/CreationDate': "D:20160214132423-08'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/Keywords': 'Broadcom, Security Target, ASIC, SPS02, embedded systems, crypto accelerators, secure processing system, die isolated hard macro, RNG, RSA, AES, TDES, HMAC, Elliptic Curve, secure memory, embedded flash', '/ModDate': "D:20160308085105-08'00'", '/Producer': 'Acrobat Distiller 9.5.2 (Windows)', '/Subject': 'Security Target Lite for the BCM_SPS02 Version 1.0', '/Title': 'Microsoft Word - Securtiy_Target_lite_for_BCM_SPS02_v1.0.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0915-2016', 'cert_item': 'BCM_SPS02 Secure Processing System with IC Dedicated Software, Version 1.0', 'developer': 'Broadcom Corporation', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 5 augmented by AVA_VAN.5 and ALC_DVS.2 SOGIS Recognition Agreement'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0915-2016': 21}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 4}}, 'cc_security_level': {'EAL': {'EAL 5': 14, 'EAL 4': 9, 'EAL 1': 7, 'EAL 2': 4, 'EAL 5+': 1, 'EAL 6': 4, 'EAL5': 1, 'EAL 3': 4, 'EAL 7': 4, 'EAL 5 augmented': 3, 'EAL5 augmented': 1}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_INT.2': 2, 'ADV_TDS.4': 2, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_FLR': 3, 'ALC_CMS.5': 3, 'ALC_TAT.2': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_DPT.3': 2, 'ATE_FUN': 2, 'ATE_IND': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN': 3, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 3}, 'R': {'R.O': 3}}, 'vendor': {'Broadcom': {'Broadcom': 17}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 2}}, 'constructions': {'MAC': {'HMAC': 2}}}, 'asymmetric_crypto': {'FF': {'DH': {'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RNG': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Physical Probing': 1, 'physical probing': 1, 'SPA': 1, 'DPA': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS31': 1, 'AIS26': 1, 'AIS 34': 2, 'AIS 25': 2, 'AIS 26': 2, 'AIS 46': 4, 'AIS 37': 2, 'AIS 31': 2, 'AIS 36': 3, 'AIS 35': 2, 'AIS 32': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Version 3.3, 2016-01-21, Security Target for the BCM_SPS02, Broadcom Corporation (confidential document) [7] Evaluation Technical Report, Version 1, 2016-02-18, ETR Summary for BCM_SPS02, TÜV': 1, 'GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January': 1, 'according to AIS 36, Version 1, 2016-02-18, ETR COMP for BCM_SPS02, TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL': 1, "List for the BCM_SPS02 with Evaluation Assurance Level EAL5 augmented, Broadcom Corporation (confidential document) [12] Guidance documentation for the TOE, BCM_SPS02 User's Guide, Version 2.14, Broadcom": 1, 'confidential document) [13] Guidance documentation for the TOE, Datasheet 20211, Version 1.0, 22 March 2015, Broadcom': 1, 'confidential document) [14] Guidance documentation for the TOE, BCM20211 – Update of FW and Secure OS, Version 1.5': 1, 'Broadcom Corporation (confidential document) [15] Guidance documentation for the TOE, ARM Architecture v6M Reference Manual, ARMDDI0419C': 1, ' Rev C, September 2010, Broadcom Corporation (confidential document) 23 / 36 Certification Report BSI-DSZ-CC-0915-2016 This page is intentionally left blank. 24 / 36': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL5': 6, 'EAL4': 1, 'EAL5+': 1, 'EAL 5': 4, 'EAL5 augmented': 3, 'EAL4 augmented': 1, 'EAL 5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.5': 3, 'ADV_IMP.1': 2, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_FSP': 1, 'ADV_FSP.4': 1, 'ADV_FSP.2': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 10, 'ALC_CMC.4': 1, 'ALC_CMS.5': 3, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_CMS': 1, 'ALC_CMS.4': 1, 'ALC_DVS.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 12}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 1, 'FAU_SAS.1': 8, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG': 3, 'FCS_RNG.1': 8, 'FCS_COP': 93, 'FCS_CKM': 47, 'FCS_COP.1': 9, 'FCS_CKM.1': 30, 'FCS_COP.1.1': 9, 'FCS_CKM.4': 30, 'FCS_CKM.4.1': 3, 'FCS_CKM.1.1': 2, 'FCS_CKM.2': 5}, 'FDP': {'FDP_SDC.1': 9, 'FDP_SDI.2': 9, 'FDP_ITT.1': 10, 'FDP_IFC.1': 20, 'FDP_UCT.1': 11, 'FDP_UIT.1': 11, 'FDP_ACC': 10, 'FDP_ACF': 11, 'FDP_ACC.1': 24, 'FDP_ACF.1': 20, 'FDP_SDC.1.1': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITC.1': 26, 'FDP_ITC.2': 26, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.4': 1, 'FDP_IFF.1': 2}, 'FMT': {'FMT_LIM': 1, 'FMT_LIM.1': 6, 'FMT_LIM.2': 6, 'FMT_MSA.1': 13, 'FMT_MSA.3': 18, 'FMT_SMF.1': 11, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 6, 'FMT_MSA.1.1': 1, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_TST.2': 31, 'FPT_TST': 4, 'FPT_TST.1': 8, 'FPT_TST.2.1': 2, 'FPT_FLS.1': 11, 'FPT_PHP.3': 11, 'FPT_ITT.1': 9}, 'FRU': {'FRU_FLT.2': 9}, 'FTP': {'FTP_ITC.1': 17, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 4}}, 'cc_claims': {'O': {'O.RND': 4, 'O.TDES': 8, 'O.AES': 7, 'O.SHA': 6, 'O.RSA': 10, 'O.ECC': 11, 'O.HMAC': 10}, 'T': {'T.RND': 3}}, 'vendor': {'Broadcom': {'Broadcom': 189}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 46, 'AES128': 1, 'AES192': 1, 'AES256': 1}}, 'DES': {'DES': {'DES': 8}, '3DES': {'TDES': 35, '3DES': 1, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 33, 'CMAC': 5}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 10}, 'ECDSA': {'ECDSA': 37}, 'ECC': {'ECC': 22}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 6}, 'SHA2': {'SHA256': 9, 'SHA224': 4, 'SHA384': 4, 'SHA512': 4}}}, 'crypto_scheme': {'MAC': {'MAC': 11}, 'KEX': {'Key Exchange': 3}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 3}, 'RNG': {'RNG': 8, 'RND': 7}}, 'cipher_mode': {'ECB': {'ECB': 9}, 'CBC': {'CBC': 14}, 'CTR': {'CTR': 2}, 'OFB': {'OFB': 2}}, 'ecc_curve': {'NIST': {'secp192r1': 9, 'secp224r1': 7, 'secp256r1': 8, 'secp384r1': 7, 'secp521r1': 7}, 'Brainpool': {'brainpoolP192r1': 5, 'brainpoolP192t1': 5, 'brainpoolP224r1': 6, 'brainpoolP224t1': 6, 'brainpoolP256r1': 6, 'brainpoolP256t1': 6, 'brainpoolP384r1': 6, 'brainpoolP384t1': 6, 'brainpoolP512r1': 6, 'brainpoolP512t1': 6}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Physical Probing': 4, 'physical probing': 1, 'side channel': 2, 'side‐channel': 3, 'DPA': 4, 'SPA': 1}, 'FI': {'Malfunction': 11, 'DFA': 1}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1}, 'PKCS': {'PKCS#1': 11}, 'BSI': {'AIS31': 4, 'AIS32': 1, 'AIS 31': 1}, 'RFC': {'RFC3447': 12, 'RFC 3447': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0915a_pdf.pdf
. - The st_filename property was set to
0915b_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0915-2016
. - The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['CRP297', 'CRP292']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['CRP297', 'CRP292']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['CRP297', 'CRP300', 'CRP292']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['CRP297', 'CRP300', 'CRP298', 'CRP292']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915b_pdf.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['CRP298']}}}
data.
- The report_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name BCM_SPS02 Secure Processing System with IC Dedicated Software Version 1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "272151c942e83db2",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0915-2016",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"CRP300",
"CRP297",
"CRP292"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"CRP298",
"CRP300",
"CRP297",
"CRP292"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"CRP297",
"CRP292"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"CRP297",
"CRP292"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-06-01",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915ma1a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915ma1b_pdf.pdf",
"maintenance_title": "BCM_SPS02 Secure Processing System with Firmware version 002.010 or 002.020"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-12-02",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915ma3a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915ma3b_pdf.pdf",
"maintenance_title": "BCM_SPS02 Secure Processing System with Firmware version 002.030"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2017-08-09",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915ma4a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "BCM_SPS02 Secure Processing System with IC Dedicated Software Version 002.030"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2016-07-27",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915ma2a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "BCM_SPS02 Secure Processing System with Firmware version 002.010 or 002.020"
}
]
},
"manufacturer": "Broadcom Corporation",
"manufacturer_web": "https://www.broadcom.com",
"name": "BCM_SPS02 Secure Processing System with IC Dedicated Software Version 1.0",
"not_valid_after": "2021-02-25",
"not_valid_before": "2016-02-25",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0915a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by AVA_VAN.5 and ALC_DVS.2 SOGIS Recognition Agreement",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0915-2016",
"cert_item": "BCM_SPS02 Secure Processing System with IC Dedicated Software, Version 1.0",
"cert_lab": "BSI",
"developer": "Broadcom Corporation",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014"
}
},
"report_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0915-2016": 21
}
},
"cc_claims": {
"O": {
"O.C": 3
},
"R": {
"R.O": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 2,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 7,
"ALC_FLR": 3,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 3,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 2,
"ATE_DPT.4": 1,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 2,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 7,
"EAL 2": 4,
"EAL 3": 4,
"EAL 4": 9,
"EAL 5": 14,
"EAL 5 augmented": 3,
"EAL 5+": 1,
"EAL 6": 4,
"EAL 7": 4,
"EAL5": 1,
"EAL5 augmented": 1
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
" Rev C, September 2010, Broadcom Corporation (confidential document) 23 / 36 Certification Report BSI-DSZ-CC-0915-2016 This page is intentionally left blank. 24 / 36": 1,
"Broadcom Corporation (confidential document) [15] Guidance documentation for the TOE, ARM Architecture v6M Reference Manual, ARMDDI0419C": 1,
"GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January": 1,
"List for the BCM_SPS02 with Evaluation Assurance Level EAL5 augmented, Broadcom Corporation (confidential document) [12] Guidance documentation for the TOE, BCM_SPS02 User\u0027s Guide, Version 2.14, Broadcom": 1,
"Version 3.3, 2016-01-21, Security Target for the BCM_SPS02, Broadcom Corporation (confidential document) [7] Evaluation Technical Report, Version 1, 2016-02-18, ETR Summary for BCM_SPS02, T\u00dcV": 1,
"according to AIS 36, Version 1, 2016-02-18, ETR COMP for BCM_SPS02, T\u00dcV Informationstechnik GmbH (confidential document) 8 specifically \u2022 AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"confidential document) [13] Guidance documentation for the TOE, Datasheet 20211, Version 1.0, 22 March 2015, Broadcom": 1,
"confidential document) [14] Guidance documentation for the TOE, BCM20211 \u2013 Update of FW and Secure OS, Version 1.5": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
},
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {
"SCA": {
"DPA": 1,
"Physical Probing": 1,
"SPA": 1,
"physical probing": 1
},
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 3,
"AIS 37": 2,
"AIS 46": 4,
"AIS26": 1,
"AIS31": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"TDES": 2
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"HMAC": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Broadcom": {
"Broadcom": 17
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20160310152533+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, EAL 5, Broadcom, memory encryption, SOGIS MRA\"",
"/ModDate": "D:20160311085504+01\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Subject": "secure processing system",
"/Title": "Certification Report BSI-DSZ-CC-0915-2016",
"pdf_file_size_bytes": 1152250,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.sogisportal.eu/",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/AIS",
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierungsreporte"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
},
"st_filename": "0915b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 22
},
"ECDH": {
"ECDH": 10
},
"ECDSA": {
"ECDSA": 37
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.AES": 7,
"O.ECC": 11,
"O.HMAC": 10,
"O.RND": 4,
"O.RSA": 10,
"O.SHA": 6,
"O.TDES": 8
},
"T": {
"T.RND": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP": 1,
"ADV_FSP.2": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 3,
"ADV_IMP.1": 2,
"ADV_INT.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 10,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 12
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 4,
"EAL 5 augmented": 2,
"EAL4": 1,
"EAL4 augmented": 1,
"EAL5": 6,
"EAL5 augmented": 3,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 1,
"FAU_SAS.1": 8,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM": 47,
"FCS_CKM.1": 30,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 5,
"FCS_CKM.4": 30,
"FCS_CKM.4.1": 3,
"FCS_COP": 93,
"FCS_COP.1": 9,
"FCS_COP.1.1": 9,
"FCS_RNG": 3,
"FCS_RNG.1": 8
},
"FDP": {
"FDP_ACC": 10,
"FDP_ACC.1": 24,
"FDP_ACC.1.1": 1,
"FDP_ACF": 11,
"FDP_ACF.1": 20,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 20,
"FDP_IFF.1": 2,
"FDP_ITC.1": 26,
"FDP_ITC.2": 26,
"FDP_ITT.1": 10,
"FDP_SDC.1": 9,
"FDP_SDC.1.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 9,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT.1": 11,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 11,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FMT": {
"FMT_LIM": 1,
"FMT_LIM.1": 6,
"FMT_LIM.2": 6,
"FMT_MSA.1": 13,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 18,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 6
},
"FPT": {
"FPT_FLS.1": 11,
"FPT_ITT.1": 9,
"FPT_PHP.3": 11,
"FPT_TST": 4,
"FPT_TST.1": 8,
"FPT_TST.2": 31,
"FPT_TST.2.1": 2
},
"FRU": {
"FRU_FLT.2": 9
},
"FTP": {
"FTP_ITC.1": 17,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 14
},
"CTR": {
"CTR": 2
},
"ECB": {
"ECB": 9
},
"OFB": {
"OFB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"KEX": {
"Key Exchange": 3
},
"MAC": {
"MAC": 11
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP192r1": 5,
"brainpoolP192t1": 5,
"brainpoolP224r1": 6,
"brainpoolP224t1": 6,
"brainpoolP256r1": 6,
"brainpoolP256t1": 6,
"brainpoolP384r1": 6,
"brainpoolP384t1": 6,
"brainpoolP512r1": 6,
"brainpoolP512t1": 6
},
"NIST": {
"secp192r1": 9,
"secp224r1": 7,
"secp256r1": 8,
"secp384r1": 7,
"secp521r1": 7
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA1": 6
},
"SHA2": {
"SHA224": 4,
"SHA256": 9,
"SHA384": 4,
"SHA512": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 7,
"RNG": 8
},
"TRNG": {
"TRNG": 3
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Malfunction": 11
},
"SCA": {
"DPA": 4,
"Physical Probing": 4,
"SPA": 1,
"physical probing": 1,
"side channel": 2,
"side\u2010channel": 3
},
"other": {
"JIL": 2
}
},
"standard_id": {
"BSI": {
"AIS 31": 1,
"AIS31": 4,
"AIS32": 1
},
"FIPS": {
"FIPS PUB 197": 1
},
"PKCS": {
"PKCS#1": 11
},
"RFC": {
"RFC 3447": 1,
"RFC3447": 12
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 46,
"AES128": 1,
"AES192": 1,
"AES256": 1
}
},
"DES": {
"3DES": {
"3DES": 1,
"TDEA": 1,
"TDES": 35
},
"DES": {
"DES": 8
}
},
"constructions": {
"MAC": {
"CMAC": 5,
"HMAC": 33
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Broadcom": {
"Broadcom": 189
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Mark Buer",
"/CreationDate": "D:20160214132423-08\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/Keywords": "Broadcom, Security Target, ASIC, SPS02, embedded systems, crypto accelerators, secure processing system, die isolated hard macro, RNG, RSA, AES, TDES, HMAC, Elliptic Curve, secure memory, embedded flash",
"/ModDate": "D:20160308085105-08\u002700\u0027",
"/Producer": "Acrobat Distiller 9.5.2 (Windows)",
"/Subject": "Security Target Lite for the BCM_SPS02 Version 1.0",
"/Title": "Microsoft Word - Securtiy_Target_lite_for_BCM_SPS02_v1.0.docx",
"pdf_file_size_bytes": 698532,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 94
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"BAROC_SC_PP_V1.0",
"JAVA_OC",
"SECURITY_IC_AUGP_V1.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
"pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL5+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0915b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b3af4619d497ef0a9cd93c15bcc608ca576eeb7b8c8d047c3a937678e6d0f861",
"txt_hash": "036786466ecfb3683067efe6e695a332d4349beadb9895c04b902fbb855bfbf6"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "70618d63f11aacf4b5679f502761745cdabfdd012939709a9dd2e7703ba23d94",
"txt_hash": "80c4d9ba965f252796be56e3e2324402953175e106ba7e89b17e04687629957a"
}
},
"status": "archived"
}