This page was not yet optimized for use on mobile
devices.
Secure Element Protection Profile - GPC_SPE_174, version 1.0
Web information
| Status | active |
|---|---|
| Valid from | 18.03.2021 |
| Scheme | 🇪🇸 ES |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VAN.5, EAL4+, ALC_DVS.2 |
Certification report
Extracted keywords
Trusted Execution Environments
SESecurity level
EAL 4, EAL 1, EAL 2, EAL 4 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, AVA_VAN.5, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2Protection profiles
BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0084-2014Certificates
2020-37-INF-3429- v1Evaluation facilities
Applus LaboratoriesFile metadata
| Author | 9308 |
|---|---|
| Creation date | D:20210318184458+01'00' |
| Modification date | D:20210318184458+01'00' |
| Pages | 13 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Protection Profile
Extracted keywords
Symmetric Algorithms
AES, AES-128, DES, TDEA, TDES, HMAC, KMAC, CMACAsymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA-384, SHA-512Schemes
MAC, Key Agreement, Key agreement, AEADProtocols
TLS, TLS 1.2, PACERandomness
RNGBlock cipher modes
CBC, CCMTLS cipher suites
TLS_PSK_WITH_3DES_EDE_CBC_S, TLS_PSK_WITH_AES_128_CBC_SH, TLS_PSK_WITH_NULL_SHA, TLS_PSK_WITH_NULL_SHA256Trusted Execution Environments
SESecurity level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmentedClaims
D.C, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.APP_KEYS, D.ISD_KEYS, D.APSD_KEYS, D.CASD_KEYS, D.TOE_IDENTIFIER, D.GP_REGISTRY, D.GP_CODE, D.PIN, D.CLFDB-DK, D.GS-PARAMETERS, D.CVM_PIN, D.CVM_MGMT_STATE, D.TOKEN-VERIFICATION-, D.RECEIPT-, D.CONFIRMATION-DATA, D.RECEIPT-GENERATION-KEY, D.TOKEN-VERIFICATION-KEY, D.DAP_BLOCK, D.APSD_DAP_KEYS, D.CASD_DAP_KEYS, D.CCCM_KEYS, D.CTL_REGISTRY, D.CTL_PRO, D.OLD_ELF, D.NEW_ELF, D.ELF_AID, D.ELF_SESSION_ST, D.ELF_APP_INS, D.ELF_RG_DATA, D.SEMS-APPLICATION-CODE, D.SEMS-APPLICATION-DATA, D.SEMS-PUBLIC-KEYS, D.SEMS-PRIVATE-KEYS, D.OS-UPDATE_SGNVER-KEY, D.OS-UPDATE_DEC-KEY, D.OS-UPDATE_ADDITIONALCODE, D.OS-UPDATE-CODE-ID, D.OS-UPDATE-, D.OS-, D.OS-UPDATE_SGNVER-, O.DELETION, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.ARRAY_VIEWS_CONFID, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.DOMAIN-RIGHTS, O.APPLI-AUTH, O.COMM-AUTH, O.COMM-INTEGRITY, O.COMM-CONFIDENTIALITY, O.SECURITY-DOMAINS, O.NO-KEY-REUSE, O.PRIVILEGES-MANAGEMENT, O.LC-MANAGEMENT, O.SECURITY-, O.COMM-, O.PRIVILEGES-, O.CLFDB-DECIPHER, O.CLFDB-, O.CARD-, O.GLOBAL-CVM, O.CVM-BLOCK, O.CVM-MGMT, O.RECEIPT, O.TOKEN, O.CCCM, O.CTL_REGISTRY, O.CTL_SC, O.CRS_PRIVILEGES, O.CRS_COUNTERS, O.ELF_AUTHORISED, O.ELF_INTEGRITY, O.ELF_APP_DATA, O.ELF_SESSION, O.ELF_DELE_IRR, O.ELF_DATA_PRO, O.SEMS-CCCM, O.SEMS-SCRIPT-AUTH, O.SEMS-COMMAND-AUTH, O.SEMS-OPEN, O.SEMS-COMMAND-, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-OS-UPDATE, O.SECURE_AC_ACTIVATIO, O.CONFID-OS-, O.SECURE_LOAD_, O.SECURE_AC_AC, O.TOE_IDENTIFICA, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.UNAUTHORISED-CARD-MGMT, T.PHYSICAL, T.COM-EXPLOIT, T.LIFE-CYCLE, T.BRUTE-FORCE-SCP, T.INSTALL, T.UNAUTHORISED-CARD-, T.UNAUTHORISED-, T.CLFDB-DISC, T.CVM-IMPERSONATE, T.CVM-UPDATE, T.BRUTE-FORCE-CVM, T.CVM-, T.BRUTE-, T.RECEIPT, T.TOKEN, T.CTL-REGISTRY-OVERWRITE, T.COUNTERS-FREEZE, T.CTL-AUTH-FORGE, T.CRS-BYPASS, T.CTL-REGISTRY-, T.CTL-AUTH-, T.COUNTERS-, T.ELF-UNAUTHORISED, T.ELF-VERSION, T.ELF-DATA-ACCESS, T.ELF-DATA-INTEGRITY, T.ELF-SESSION, T.ELF-ILL-COMMAND, T.ELF-RES-DATA, T.SEMS-IMPERSONATE, T.UNAUTHORISED-TOE-CODE-UPDATE, T.FAKE-SGNVER-KEY, T.WRONG-UPDATE-STATE, T.INTEG-OS-UPDATE-LOAD, T.CONFID-OS-UPDATE-LOAD, T.UNAUTHORISED-TOE-, A.DELETION, A.CAP_FILE, A.VERIFICATION, A.ADMIN, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, A.KEY-ESCROW, A.PERSONALISER, A.CONTROLLING-AUTHORITY, A.PRODUCTION, A.ISSUER, A.SCP-SUPP, A.KEYS-PROT, A.VERIFICATION-, A.CONTROLLING-, A.SEMS-SERVICE-PROVIDER, A.SEMS-APPS-PROVIDER, A.OS-UPDATE-EVIDENCE, A.SECURE_ACODE_MANAGEMENT, A.SECURE_ACODE_, OE.CARD-, OE.CAP_FILE, OE.CARD-MANAGEMENT, OE.SCP, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.ADMIN, OE.APPS-PROVIDER, OE.VERIFICATION-AUTHORITY, OE.KEY-ESCROW, OE.PERSONALISER, OE.CONTROLLING-AUTHORITY, OE.SCP-SUPP, OE.KEYS-PROT, OE.PRODUCTION, OE.AID-MANAGEMENT, OE.LOADING, OE.SERVERS, OE.AP-KEYS, OE.KEY-GENERATION, OE.CA-KEYS, OE.VA-KEYS, OE.KEY-CHANGE, OE.ISSUER, OE.ISD-KEYS, OE.APPLICATIONS, OE.VERIFICATION-, OE.CONTROLLING-, OE.CLFDB-ENC-PR, OE.CLFDB-, OE.TOKEN-GEN, OE.RECEIPT-VER, OE.DAP_BLOCK_GEN, OE.SEMS-SERVICE-PROVIDER, OE.SEMS-APPS-PROVIDER, OE.SEMS-SERVICE-, OE.SEMS-APPS-, OE.OS-UPDATE-ENCRYPTION, OE.OS-UPDATE-EVIDENCE, OE.SECURE_ACODE_MANAGEMENT, OE.OS-UPDATE-, OE.SECURE_ACODE_, OSP.VERIFICATION, OSP.AID-MANAGEMENT, OSP.LOADING, OSP.SERVERS, OSP.APSD-KEYS, OSP.KEY-GENERATION, OSP.CASD-KEYS, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.ISD-KEYS, OSP.APPLICATIONS, OSP.SECURITY-, OSP.CLFDB-ENC-PR, OSP.CLFDB-, OSP.TOKEN-GEN, OSP.RECEIPT-VER, OSP.DAP_BLOCK_GEN, OSP.CCCM, OSP.ELF_DELE_OP, OSP.ATOMIC_ACTIVATION, OSP.TOE_IDENTIFICATION, OSP.ADDITIONAL_CODE_SIGNING, OSP.ADDITIONAL_CODE_ENCRYPTION, OSP.ADDITIONAL_CODE_Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCO_NRO.2, FCO_NRR, FCO_NRR.1, FCS_RNG, FCS_COP, FCS_RNG.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_SDI, FDP_ITC, FDP_UIT, FDP_UCT, FDP_IFC.2, FDP_IFF.1, FDP_ITC.2, FDP_UIT.1, FDP_ROL.1, FDP_UCT.1, FDP_ACC.1, FDP_IFC.1, FDP_ITC.1, FDP_ACF.1, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FIA_AFL, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_AFL.1, FIA_ATD.1, FMT_MSA, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FMT_SMR, FMT_SMF, FMT_MTD.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.3, FPR_UNO.1, FPR_UNO, FPT_FLS.1, FPT_TDC.1, FPT_FLS, FPT_RCV, FPT_TDC, FPT_RCV.3, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FTP_ITC, FTP_TRP, FTP_TRP.1, FTP_ITC.1Protection profiles
BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0084-2014, ANSSI-CC-PP 2010/04Certificates
ANSSI-CC-PP 2010/04Side-channel analysis
physical tamperingCertification process
out of scope, • Post-issuance applications and security domains are out of scope of this PP, i.e. how the corresponding security functions are implemented) is out of scope of this document, and Dedicated Software defined in [PP-0084]. • Post-issuance applications and security domains are out of scope of this PP. The ST author may decide to extend this scope with applicative functionality. 28 /166, these requirements are enforced (i.e. how the corresponding security functions are implemented) is out of scope of this document. Although the GlobalPlatform specifications offer a variety of mechanisms that canStandards
FIPS PUB 140-2, FIPS 140-2, FIPS PUB 180-4, FIPS 180-4, FIPS PUB 186-4, FIPS 186-4, FIPS 198, FIPS 197, NIST SP 800-108, NIST SP 800-131A, NIST SP 800-38A, NIST SP 800-38B, NIST SP 800-56A, NIST SP 800-56B, NIST SP 800-57, NIST SP 800-67, PKCS #1, PKCS#1, AIS 20, AIS 31, AIS20, AIS31, RFC 2119, RFC 2616, RFC 2818, RFC 4279, RFC 5246, RFC 5639, RFC 5758, ISO/IEC 9797-1, ISO/IEC 10118-3, ISO/IEC 19772:2009, ICAO, X.509, SCP02, SCP10, SCP11, SCP21, SCP22, SCP80, SCP81, SCP03Technical reports
BSI TR-02102-1, BSI TR-03111File metadata
| Title | Secure Element Protection Profile |
|---|---|
| Subject | 1.0 |
| Author | GlobalPlatform, Inc. |
| Creation date | D:20210217145949+01'00' |
| Modification date | D:20210217150220+01'00' |
| Pages | 166 |
| Creator | Acrobat PDFMaker 21 for Word |
| Producer | Adobe PDF Library 21.1.167 |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- 5G PK 5.2.2 Advanced SIM (D00233151F016B) active
- Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33) active
- MultiApp 5.2 Premium PQC GP-SE(version 5.2) (ANSSI-CC-2025/30) active
- Plateforme Java Card MultiApp GP-SE (version 5.0) active
- Platforme MultiApp V5.1 GP-SE (version 5.1) (2023/33) active
- TEQS V1.0 (version 1.0) (ANSSI-CC-2025/20) active
- TESS v5.0 Platform (revision 1.0) (ANSSI-CC-2024/12) active
- TESS v5.1 Platform (Revision 1.0) (ANSSI-CC-2024/28) active
- TESS v5.2 Platform(Révision 1.0) (ANSSI-CC-2025/19) active
- TESS v7.1 Platform Revision 1.0 active
- TESS v7.1 Platform Revision 1.0 active
- Thales TESS v3.0 Platform active
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "3ebd6b9f8d81e522",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "3ebd6b9f8d81e522",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "CCN-CC-PP-5-2021.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 22
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 10
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 1024": 12
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP 2010/04": 2
}
},
"cc_claims": {
"A": {
"A.ADMIN": 4,
"A.APPS-PROVIDER": 4,
"A.CAP_FILE": 1,
"A.CONTROLLING-": 1,
"A.CONTROLLING-AUTHORITY": 3,
"A.DELETION": 3,
"A.ISSUER": 4,
"A.KEY-ESCROW": 4,
"A.KEYS-PROT": 4,
"A.OS-UPDATE-EVIDENCE": 2,
"A.PERSONALISER": 4,
"A.PRODUCTION": 4,
"A.SCP-SUPP": 4,
"A.SECURE_ACODE_": 1,
"A.SECURE_ACODE_MANAGEMENT": 1,
"A.SEMS-APPS-PROVIDER": 2,
"A.SEMS-SERVICE-PROVIDER": 2,
"A.VERIFICATION": 1,
"A.VERIFICATION-": 1,
"A.VERIFICATION-AUTHORITY": 3
},
"D": {
"D.API_DATA": 1,
"D.APP_CODE": 2,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 3,
"D.APP_KEYS": 9,
"D.APSD_DAP_KEYS": 1,
"D.APSD_KEYS": 6,
"D.C": 1,
"D.CASD_DAP_KEYS": 1,
"D.CASD_KEYS": 4,
"D.CCCM_KEYS": 1,
"D.CLFDB-DK": 1,
"D.CONFIRMATION-DATA": 2,
"D.CRYPTO": 1,
"D.CTL_PRO": 5,
"D.CTL_REGISTRY": 5,
"D.CVM_MGMT_STATE": 3,
"D.CVM_PIN": 3,
"D.DAP_BLOCK": 1,
"D.ELF_AID": 3,
"D.ELF_APP_INS": 3,
"D.ELF_RG_DATA": 1,
"D.ELF_SESSION_ST": 2,
"D.GP_CODE": 2,
"D.GP_REGISTRY": 7,
"D.GS-PARAMETERS": 1,
"D.ISD_KEYS": 6,
"D.JCS_CODE": 4,
"D.JCS_DATA": 4,
"D.NEW_ELF": 3,
"D.OLD_ELF": 3,
"D.OS-": 4,
"D.OS-UPDATE-": 1,
"D.OS-UPDATE-CODE-ID": 2,
"D.OS-UPDATE_ADDITIONALCODE": 2,
"D.OS-UPDATE_DEC-KEY": 2,
"D.OS-UPDATE_SGNVER-": 1,
"D.OS-UPDATE_SGNVER-KEY": 1,
"D.PIN": 1,
"D.RECEIPT-": 1,
"D.RECEIPT-GENERATION-KEY": 1,
"D.SEC_DATA": 2,
"D.SEMS-APPLICATION-CODE": 1,
"D.SEMS-APPLICATION-DATA": 1,
"D.SEMS-PRIVATE-KEYS": 1,
"D.SEMS-PUBLIC-KEYS": 1,
"D.TOE_IDENTIFIER": 2,
"D.TOKEN-VERIFICATION-": 1,
"D.TOKEN-VERIFICATION-KEY": 1
},
"O": {
"O.ALARM": 3,
"O.APPLI-AUTH": 8,
"O.ARRAY_VIEWS_CONFID": 1,
"O.CARD-": 1,
"O.CARD-MANAGEMENT": 16,
"O.CCCM": 3,
"O.CIPHER": 5,
"O.CLFDB-": 1,
"O.CLFDB-DECIPHER": 3,
"O.COMM-": 3,
"O.COMM-AUTH": 10,
"O.COMM-CONFIDENTIALITY": 7,
"O.COMM-INTEGRITY": 10,
"O.CONFID-OS-": 3,
"O.CONFID-OS-UPDATE": 3,
"O.CRS_COUNTERS": 3,
"O.CRS_PRIVILEGES": 3,
"O.CTL_REGISTRY": 3,
"O.CTL_SC": 3,
"O.CVM-BLOCK": 6,
"O.CVM-MGMT": 7,
"O.DELETION": 4,
"O.DOMAIN-RIGHTS": 10,
"O.ELF_APP_DATA": 4,
"O.ELF_AUTHORISED": 3,
"O.ELF_DATA_PRO": 3,
"O.ELF_DELE_IRR": 3,
"O.ELF_INTEGRITY": 3,
"O.ELF_SESSION": 4,
"O.FIREWALL": 3,
"O.GLOBAL-CVM": 3,
"O.GLOBAL_ARRAYS_CONFID": 1,
"O.GLOBAL_ARRAYS_INTEG": 1,
"O.INSTALL": 5,
"O.KEY-MNGT": 3,
"O.LC-MANAGEMENT": 6,
"O.LOAD": 5,
"O.NATIVE": 1,
"O.NO-KEY-REUSE": 6,
"O.OBJ-DELETION": 1,
"O.OPERATE": 3,
"O.PIN-MNGT": 1,
"O.PRIVILEGES-": 2,
"O.PRIVILEGES-MANAGEMENT": 4,
"O.REALLOCATION": 1,
"O.RECEIPT": 3,
"O.RESOURCES": 3,
"O.RNG": 3,
"O.SECURE_AC_AC": 1,
"O.SECURE_AC_ACTIVATIO": 2,
"O.SECURE_AC_ACTIVATION": 2,
"O.SECURE_LOAD_": 1,
"O.SECURE_LOAD_ACODE": 5,
"O.SECURITY-": 1,
"O.SECURITY-DOMAINS": 5,
"O.SEMS-CCCM": 3,
"O.SEMS-COMMAND-": 2,
"O.SEMS-COMMAND-AUTH": 2,
"O.SEMS-OPEN": 4,
"O.SEMS-SCRIPT-AUTH": 4,
"O.SID": 3,
"O.TOE_IDENTIFICA": 1,
"O.TOE_IDENTIFICATION": 4,
"O.TOKEN": 3,
"O.TRANSACTION": 1
},
"OE": {
"OE.ADMIN": 4,
"OE.AID-MANAGEMENT": 4,
"OE.AP-KEYS": 4,
"OE.APPLICATIONS": 4,
"OE.APPS-PROVIDER": 4,
"OE.CA-KEYS": 4,
"OE.CAP_FILE": 1,
"OE.CARD-": 1,
"OE.CARD-MANAGEMENT": 2,
"OE.CLFDB-": 1,
"OE.CLFDB-ENC-PR": 2,
"OE.CODE-EVIDENCE": 1,
"OE.CONTROLLING-": 1,
"OE.CONTROLLING-AUTHORITY": 3,
"OE.DAP_BLOCK_GEN": 3,
"OE.ISD-KEYS": 4,
"OE.ISSUER": 4,
"OE.KEY-CHANGE": 4,
"OE.KEY-ESCROW": 4,
"OE.KEY-GENERATION": 4,
"OE.KEYS-PROT": 4,
"OE.LOADING": 4,
"OE.OS-UPDATE-": 1,
"OE.OS-UPDATE-ENCRYPTION": 4,
"OE.OS-UPDATE-EVIDENCE": 2,
"OE.PERSONALISER": 4,
"OE.PRODUCTION": 4,
"OE.RECEIPT-VER": 3,
"OE.SCP": 3,
"OE.SCP-SUPP": 4,
"OE.SECURE_ACODE_": 2,
"OE.SECURE_ACODE_MANAGEMENT": 1,
"OE.SEMS-APPS-": 1,
"OE.SEMS-APPS-PROVIDER": 2,
"OE.SEMS-SERVICE-": 1,
"OE.SEMS-SERVICE-PROVIDER": 2,
"OE.SERVERS": 4,
"OE.TOKEN-GEN": 3,
"OE.VA-KEYS": 1,
"OE.VERIFICATION": 1,
"OE.VERIFICATION-": 1,
"OE.VERIFICATION-AUTHORITY": 3
},
"OSP": {
"OSP.ADDITIONAL_CODE_": 2,
"OSP.ADDITIONAL_CODE_ENCRYPTION": 1,
"OSP.ADDITIONAL_CODE_SIGNING": 1,
"OSP.AID-MANAGEMENT": 4,
"OSP.APPLICATIONS": 4,
"OSP.APSD-KEYS": 4,
"OSP.ATOMIC_ACTIVATION": 2,
"OSP.CASD-KEYS": 4,
"OSP.CCCM": 2,
"OSP.CLFDB-": 1,
"OSP.CLFDB-ENC-PR": 1,
"OSP.DAP_BLOCK_GEN": 2,
"OSP.ELF_DELE_OP": 2,
"OSP.ISD-KEYS": 4,
"OSP.KEY-CHANGE": 4,
"OSP.KEY-GENERATION": 4,
"OSP.LOADING": 4,
"OSP.RECEIPT-VER": 2,
"OSP.SECURITY-": 1,
"OSP.SECURITY-DOMAINS": 3,
"OSP.SERVERS": 4,
"OSP.TOE_IDENTIFICATION": 2,
"OSP.TOKEN-GEN": 2,
"OSP.VERIFICATION": 2
},
"T": {
"T.BRUTE-": 1,
"T.BRUTE-FORCE-CVM": 1,
"T.BRUTE-FORCE-SCP": 5,
"T.CLFDB-DISC": 2,
"T.COM-EXPLOIT": 9,
"T.CONFID-APPLI-DATA": 1,
"T.CONFID-JCS-CODE": 1,
"T.CONFID-JCS-DATA": 1,
"T.CONFID-OS-UPDATE-LOAD": 2,
"T.COUNTERS-": 1,
"T.COUNTERS-FREEZE": 1,
"T.CRS-BYPASS": 2,
"T.CTL-AUTH-": 1,
"T.CTL-AUTH-FORGE": 1,
"T.CTL-REGISTRY-": 1,
"T.CTL-REGISTRY-OVERWRITE": 1,
"T.CVM-": 1,
"T.CVM-IMPERSONATE": 1,
"T.CVM-UPDATE": 2,
"T.DELETION": 2,
"T.ELF-DATA-ACCESS": 2,
"T.ELF-DATA-INTEGRITY": 2,
"T.ELF-ILL-COMMAND": 2,
"T.ELF-RES-DATA": 2,
"T.ELF-SESSION": 2,
"T.ELF-UNAUTHORISED": 2,
"T.ELF-VERSION": 2,
"T.EXE-CODE": 2,
"T.FAKE-SGNVER-KEY": 2,
"T.INSTALL": 2,
"T.INTEG-APPLI-CODE": 4,
"T.INTEG-APPLI-DATA": 4,
"T.INTEG-JCS-CODE": 1,
"T.INTEG-JCS-DATA": 1,
"T.INTEG-OS-UPDATE-LOAD": 2,
"T.LIFE-CYCLE": 5,
"T.NATIVE": 1,
"T.PHYSICAL": 1,
"T.RECEIPT": 2,
"T.RESOURCES": 1,
"T.SEMS-IMPERSONATE": 2,
"T.SID": 2,
"T.TOKEN": 2,
"T.UNAUTHORISED-": 3,
"T.UNAUTHORISED-CARD-": 1,
"T.UNAUTHORISED-CARD-MGMT": 8,
"T.UNAUTHORISED-TOE-": 1,
"T.UNAUTHORISED-TOE-CODE-UPDATE": 1,
"T.WRONG-UPDATE-STATE": 2
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP 2010/04": 2
},
"BSI": {
"BSI-CC-PP-0084-2014": 2,
"BSI-CC-PP-0099-V2-2020": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 4,
"ADV_FSP.2": 2,
"ADV_FSP.4": 9,
"ADV_IMP.1": 5,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 9
},
"AGD": {
"AGD_OPE.1": 7,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 15,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 17
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 14,
"EAL4 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1
},
"FCO": {
"FCO_NRO": 29,
"FCO_NRO.2": 12,
"FCO_NRR": 4,
"FCO_NRR.1": 3
},
"FCS": {
"FCS_CKM": 23,
"FCS_CKM.1": 16,
"FCS_CKM.2": 4,
"FCS_CKM.4": 29,
"FCS_COP": 79,
"FCS_COP.1": 17,
"FCS_RNG": 14,
"FCS_RNG.1": 10,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC": 45,
"FDP_ACC.1": 23,
"FDP_ACF": 41,
"FDP_ACF.1": 36,
"FDP_IFC": 53,
"FDP_IFC.1": 16,
"FDP_IFC.2": 6,
"FDP_IFF": 42,
"FDP_IFF.1": 21,
"FDP_ITC": 34,
"FDP_ITC.1": 11,
"FDP_ITC.2": 20,
"FDP_RIP": 11,
"FDP_ROL": 16,
"FDP_ROL.1": 6,
"FDP_SDI": 1,
"FDP_UCT": 5,
"FDP_UCT.1": 1,
"FDP_UIT": 11,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 9,
"FIA_AFL.1": 9,
"FIA_ATD": 5,
"FIA_ATD.1": 1,
"FIA_UAU": 25,
"FIA_UAU.1": 3,
"FIA_UAU.4": 1,
"FIA_UID": 32,
"FIA_UID.1": 14,
"FIA_USB": 1
},
"FMT": {
"FMT_MSA": 132,
"FMT_MSA.1": 14,
"FMT_MSA.3": 22,
"FMT_MTD": 21,
"FMT_MTD.1": 3,
"FMT_MTD.3": 1,
"FMT_SMF": 70,
"FMT_SMF.1": 16,
"FMT_SMR": 78,
"FMT_SMR.1": 26
},
"FPR": {
"FPR_UNO": 11,
"FPR_UNO.1": 3
},
"FPT": {
"FPT_FLS": 24,
"FPT_FLS.1": 4,
"FPT_RCV": 17,
"FPT_RCV.3": 4,
"FPT_RCV.3.1": 1,
"FPT_RCV.3.2": 1,
"FPT_RCV.3.3": 1,
"FPT_TDC": 9,
"FPT_TDC.1": 5
},
"FTP": {
"FTP_ITC": 33,
"FTP_ITC.1": 13,
"FTP_TRP": 7,
"FTP_TRP.1": 12
}
},
"certification_process": {
"OutOfScope": {
" \u2022 Post-issuance applications and security domains are out of scope of this PP": 1,
"and Dedicated Software defined in [PP-0084]. \u2022 Post-issuance applications and security domains are out of scope of this PP. The ST author may decide to extend this scope with applicative functionality. 28 /166": 1,
"i.e. how the corresponding security functions are implemented) is out of scope of this document": 1,
"out of scope": 2,
"these requirements are enforced (i.e. how the corresponding security functions are implemented) is out of scope of this document. Although the GlobalPlatform specifications offer a variety of mechanisms that can": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 9
},
"CCM": {
"CCM": 33
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 4
},
"TLS": {
"TLS": {
"TLS": 8,
"TLS 1.2": 1
}
}
},
"crypto_scheme": {
"AEAD": {
"AEAD": 1
},
"KA": {
"Key Agreement": 12,
"Key agreement": 2
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 9,
"SHA-384": 4,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 31": 1,
"AIS20": 4,
"AIS31": 4
},
"FIPS": {
"FIPS 140-2": 4,
"FIPS 180-4": 2,
"FIPS 186-4": 2,
"FIPS 197": 3,
"FIPS 198": 4,
"FIPS PUB 140-2": 1,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-4": 2
},
"ICAO": {
"ICAO": 4
},
"ISO": {
"ISO/IEC 10118-3": 1,
"ISO/IEC 19772:2009": 1,
"ISO/IEC 9797-1": 1
},
"NIST": {
"NIST SP 800-108": 1,
"NIST SP 800-131A": 1,
"NIST SP 800-38A": 1,
"NIST SP 800-38B": 1,
"NIST SP 800-56A": 2,
"NIST SP 800-56B": 1,
"NIST SP 800-57": 1,
"NIST SP 800-67": 1
},
"PKCS": {
"PKCS #1": 2,
"PKCS#1": 4
},
"RFC": {
"RFC 2119": 2,
"RFC 2616": 1,
"RFC 2818": 1,
"RFC 4279": 1,
"RFC 5246": 1,
"RFC 5639": 3,
"RFC 5758": 3
},
"SCP": {
"SCP02": 19,
"SCP03": 19,
"SCP10": 13,
"SCP11": 13,
"SCP21": 11,
"SCP22": 21,
"SCP80": 11,
"SCP81": 11
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 46,
"AES-128": 1
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 29
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"CMAC": 5,
"HMAC": 2,
"KMAC": 4
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-02102-1": 1,
"BSI TR-03111": 1
}
},
"tee_name": {
"IBM": {
"SE": 109
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_PSK_WITH_3DES_EDE_CBC_S": 1,
"TLS_PSK_WITH_AES_128_CBC_SH": 1,
"TLS_PSK_WITH_NULL_SHA": 1,
"TLS_PSK_WITH_NULL_SHA256": 1
}
},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "GlobalPlatform, Inc.",
"/Category": "",
"/Comments": "",
"/Company": "Internet of Trust (for GlobalPlatform)",
"/CreationDate": "D:20210217145949+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 21 for Word",
"/DocStatus": "Public Release",
"/Keywords": "",
"/Manager": "SE Security Working Group",
"/ModDate": "D:20210217150220+01\u002700\u0027",
"/Producer": "Adobe PDF Library 21.1.167",
"/SourceModified": "D:20210217135904",
"/Subject": "1.0",
"/Title": "Secure Element Protection Profile",
"pdf_file_size_bytes": 1643284,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://globalplatform.org/specifications/ip-disclaimers/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 166
},
"report_filename": "2020-37 INF-3429.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2020-37-INF-3429- v1": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-CC-PP-0099-V2-2020": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 4,
"ALC_FLR": 2
},
"APE": {
"APE_CCL.1": 5,
"APE_ECD.1": 5,
"APE_INT.1": 5,
"APE_OBJ.2": 5,
"APE_REQ.2": 5,
"APE_SPD.1": 5
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 6,
"EAL 4 augmented": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 7
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "9308",
"/CreationDate": "D:20210318184458+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20210318184458+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"pdf_file_size_bytes": 812423,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.sogis.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5bc7f86d061671c1e9305fe429030945b3a361d39d96c67fb0c06624b3b12089",
"txt_hash": "1d5d07b1e9863c2a49ce1a6cad1662e5f5af9e0f5b3c4eb9980f5e318b303bb6"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4f48ca9bdb6c256e7b111deb40270bd9ccd8cb3ec907b3fe442e36a7c475b92b",
"txt_hash": "2aaea3a69161453fcd5c474f98cd3fc28fb331d6babb0fbe0c6970ea11543684"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Secure Element Protection Profile - GPC_SPE_174, version 1.0",
"not_valid_after": null,
"not_valid_before": "2021-03-18",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CCN-CC-PP-5-2021.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/2020-37 INF-3429.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL4+",
"ALC_DVS.2"
]
},
"status": "active",
"version": "1.0"
}
}