This page was not yet optimized for use on mobile devices.
Secure Element Protection Profile - GPC_SPE_174, version 1.0
Web information ?
Status: activeCertification date: 2021-03-18
Scheme: 🇪🇸
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+, AVA_VAN.5, ALC_DVS.2
Certification report ?
Extracted keywords
Trusted Execution Environments
SESecurity level
EAL 4, EAL 1, EAL 2, EAL 4 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, AVA_VAN.5, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2Protection profiles
BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0084-2014Certificates
2020-37-INF-3429- v1Evaluation facilities
Applus LaboratoriesFile metadata
Author | 9308 |
---|---|
Creation date | D:20210318184458+01'00' |
Modification date | D:20210318184458+01'00' |
Pages | 13 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, AES-128, DES, TDEA, TDES, HMAC, KMAC, CMACAsymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA-384, SHA-512Schemes
MAC, Key Agreement, Key agreement, AEADProtocols
TLS, TLS 1.2, PACERandomness
RNGBlock cipher modes
CBC, CCMTLS cipher suites
TLS_PSK_WITH_3DES_EDE_CBC_S, TLS_PSK_WITH_AES_128_CBC_SH, TLS_PSK_WITH_NULL_SHA, TLS_PSK_WITH_NULL_SHA256Trusted Execution Environments
SESecurity level
EAL 4, EAL4, EAL 4 augmented, EAL4 augmentedClaims
D.C, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.APP_KEYS, D.ISD_KEYS, D.APSD_KEYS, D.CASD_KEYS, D.TOE_IDENTIFIER, D.GP_REGISTRY, D.GP_CODE, D.PIN, D.CLFDB-DK, D.GS-PARAMETERS, D.CVM_PIN, D.CVM_MGMT_STATE, D.TOKEN-VERIFICATION-, D.RECEIPT-, D.CONFIRMATION-DATA, D.RECEIPT-GENERATION-KEY, D.TOKEN-VERIFICATION-KEY, D.DAP_BLOCK, D.APSD_DAP_KEYS, D.CASD_DAP_KEYS, D.CCCM_KEYS, D.CTL_REGISTRY, D.CTL_PRO, D.OLD_ELF, D.NEW_ELF, D.ELF_AID, D.ELF_SESSION_ST, D.ELF_APP_INS, D.ELF_RG_DATA, D.SEMS-APPLICATION-CODE, D.SEMS-APPLICATION-DATA, D.SEMS-PUBLIC-KEYS, D.SEMS-PRIVATE-KEYS, D.OS-UPDATE_SGNVER-KEY, D.OS-UPDATE_DEC-KEY, D.OS-UPDATE_ADDITIONALCODE, D.OS-UPDATE-CODE-ID, D.OS-UPDATE-, D.OS-, D.OS-UPDATE_SGNVER-, O.DELETION, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.ARRAY_VIEWS_CONFID, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.DOMAIN-RIGHTS, O.APPLI-AUTH, O.COMM-AUTH, O.COMM-INTEGRITY, O.COMM-CONFIDENTIALITY, O.SECURITY-DOMAINS, O.NO-KEY-REUSE, O.PRIVILEGES-MANAGEMENT, O.LC-MANAGEMENT, O.SECURITY-, O.COMM-, O.PRIVILEGES-, O.CLFDB-DECIPHER, O.CLFDB-, O.CARD-, O.GLOBAL-CVM, O.CVM-BLOCK, O.CVM-MGMT, O.RECEIPT, O.TOKEN, O.CCCM, O.CTL_REGISTRY, O.CTL_SC, O.CRS_PRIVILEGES, O.CRS_COUNTERS, O.ELF_AUTHORISED, O.ELF_INTEGRITY, O.ELF_APP_DATA, O.ELF_SESSION, O.ELF_DELE_IRR, O.ELF_DATA_PRO, O.SEMS-CCCM, O.SEMS-SCRIPT-AUTH, O.SEMS-COMMAND-AUTH, O.SEMS-OPEN, O.SEMS-COMMAND-, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-OS-UPDATE, O.SECURE_AC_ACTIVATIO, O.CONFID-OS-, O.SECURE_LOAD_, O.SECURE_AC_AC, O.TOE_IDENTIFICA, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.UNAUTHORISED-CARD-MGMT, T.PHYSICAL, T.COM-EXPLOIT, T.LIFE-CYCLE, T.BRUTE-FORCE-SCP, T.INSTALL, T.UNAUTHORISED-CARD-, T.UNAUTHORISED-, T.CLFDB-DISC, T.CVM-IMPERSONATE, T.CVM-UPDATE, T.BRUTE-FORCE-CVM, T.CVM-, T.BRUTE-, T.RECEIPT, T.TOKEN, T.CTL-REGISTRY-OVERWRITE, T.COUNTERS-FREEZE, T.CTL-AUTH-FORGE, T.CRS-BYPASS, T.CTL-REGISTRY-, T.CTL-AUTH-, T.COUNTERS-, T.ELF-UNAUTHORISED, T.ELF-VERSION, T.ELF-DATA-ACCESS, T.ELF-DATA-INTEGRITY, T.ELF-SESSION, T.ELF-ILL-COMMAND, T.ELF-RES-DATA, T.SEMS-IMPERSONATE, T.UNAUTHORISED-TOE-CODE-UPDATE, T.FAKE-SGNVER-KEY, T.WRONG-UPDATE-STATE, T.INTEG-OS-UPDATE-LOAD, T.CONFID-OS-UPDATE-LOAD, T.UNAUTHORISED-TOE-, A.DELETION, A.CAP_FILE, A.VERIFICATION, A.ADMIN, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, A.KEY-ESCROW, A.PERSONALISER, A.CONTROLLING-AUTHORITY, A.PRODUCTION, A.ISSUER, A.SCP-SUPP, A.KEYS-PROT, A.VERIFICATION-, A.CONTROLLING-, A.SEMS-SERVICE-PROVIDER, A.SEMS-APPS-PROVIDER, A.OS-UPDATE-EVIDENCE, A.SECURE_ACODE_MANAGEMENT, A.SECURE_ACODE_, OE.CARD-, OE.CAP_FILE, OE.CARD-MANAGEMENT, OE.SCP, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.ADMIN, OE.APPS-PROVIDER, OE.VERIFICATION-AUTHORITY, OE.KEY-ESCROW, OE.PERSONALISER, OE.CONTROLLING-AUTHORITY, OE.SCP-SUPP, OE.KEYS-PROT, OE.PRODUCTION, OE.AID-MANAGEMENT, OE.LOADING, OE.SERVERS, OE.AP-KEYS, OE.KEY-GENERATION, OE.CA-KEYS, OE.VA-KEYS, OE.KEY-CHANGE, OE.ISSUER, OE.ISD-KEYS, OE.APPLICATIONS, OE.VERIFICATION-, OE.CONTROLLING-, OE.CLFDB-ENC-PR, OE.CLFDB-, OE.TOKEN-GEN, OE.RECEIPT-VER, OE.DAP_BLOCK_GEN, OE.SEMS-SERVICE-PROVIDER, OE.SEMS-APPS-PROVIDER, OE.SEMS-SERVICE-, OE.SEMS-APPS-, OE.OS-UPDATE-ENCRYPTION, OE.OS-UPDATE-EVIDENCE, OE.SECURE_ACODE_MANAGEMENT, OE.OS-UPDATE-, OE.SECURE_ACODE_, OSP.VERIFICATION, OSP.AID-MANAGEMENT, OSP.LOADING, OSP.SERVERS, OSP.APSD-KEYS, OSP.KEY-GENERATION, OSP.CASD-KEYS, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.ISD-KEYS, OSP.APPLICATIONS, OSP.SECURITY-, OSP.CLFDB-ENC-PR, OSP.CLFDB-, OSP.TOKEN-GEN, OSP.RECEIPT-VER, OSP.DAP_BLOCK_GEN, OSP.CCCM, OSP.ELF_DELE_OP, OSP.ATOMIC_ACTIVATION, OSP.TOE_IDENTIFICATION, OSP.ADDITIONAL_CODE_SIGNING, OSP.ADDITIONAL_CODE_ENCRYPTION, OSP.ADDITIONAL_CODE_Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.2, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCO_NRO.2, FCO_NRR, FCO_NRR.1, FCS_RNG, FCS_COP, FCS_RNG.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_SDI, FDP_ITC, FDP_UIT, FDP_UCT, FDP_IFC.2, FDP_IFF.1, FDP_ITC.2, FDP_UIT.1, FDP_ROL.1, FDP_UCT.1, FDP_ACC.1, FDP_IFC.1, FDP_ITC.1, FDP_ACF.1, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FIA_AFL, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_AFL.1, FIA_ATD.1, FMT_MSA, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FMT_SMR, FMT_SMF, FMT_MTD.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.3, FPR_UNO.1, FPR_UNO, FPT_FLS.1, FPT_TDC.1, FPT_FLS, FPT_RCV, FPT_TDC, FPT_RCV.3, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FTP_ITC, FTP_TRP, FTP_TRP.1, FTP_ITC.1Protection profiles
BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0084-2014, ANSSI-CC-PP 2010/04Certificates
ANSSI-CC-PP 2010/04Side-channel analysis
physical tamperingCertification process
out of scope, • Post-issuance applications and security domains are out of scope of this PP, i.e. how the corresponding security functions are implemented) is out of scope of this document, and Dedicated Software defined in [PP-0084]. • Post-issuance applications and security domains are out of scope of this PP. The ST author may decide to extend this scope with applicative functionality. 28 /166, these requirements are enforced (i.e. how the corresponding security functions are implemented) is out of scope of this document. Although the GlobalPlatform specifications offer a variety of mechanisms that canStandards
FIPS PUB 140-2, FIPS 140-2, FIPS PUB 180-4, FIPS 180-4, FIPS PUB 186-4, FIPS 186-4, FIPS 198, FIPS 197, NIST SP 800-108, NIST SP 800-131A, NIST SP 800-38A, NIST SP 800-38B, NIST SP 800-56A, NIST SP 800-56B, NIST SP 800-57, NIST SP 800-67, PKCS #1, PKCS#1, AIS 20, AIS 31, AIS20, AIS31, RFC 2119, RFC 2616, RFC 2818, RFC 4279, RFC 5246, RFC 5639, RFC 5758, ISO/IEC 9797-1, ISO/IEC 10118-3, ISO/IEC 19772:2009, ICAO, X.509, SCP02, SCP10, SCP11, SCP21, SCP22, SCP80, SCP81, SCP03Technical reports
BSI TR-02102-1, BSI TR-03111File metadata
Title | Secure Element Protection Profile |
---|---|
Subject | 1.0 |
Author | GlobalPlatform, Inc. |
Creation date | D:20210217145949+01'00' |
Modification date | D:20210217150220+01'00' |
Pages | 166 |
Creator | Acrobat PDFMaker 21 for Word |
Producer | Adobe PDF Library 21.1.167 |
References ?
- 5G PK 5.2.2 Advanced SIM (D00233151F016B) active
- Connected eSE 5.3.4 Platform v1.1 (Revision 1.0) (ANSSI-CC-2024/33) active
- Plateforme Java Card MultiApp GP-SE (version 5.0) active
- Platforme MultiApp V5.1 GP-SE (version 5.1) (2023/33) active
- TESS v5.0 Platform (revision 1.0) (ANSSI-CC-2024/12) active
- TESS v5.1 Platform (Revision 1.0) (ANSSI-CC-2024/28) active
- Thales TESS v3.0 Platform active
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Secure Element Protection Profile - GPC_SPE_174, version 1.0 was processed.
Raw data
{
"_id": "3ebd6b9f8d81e522",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "3ebd6b9f8d81e522",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "CCN-CC-PP-5-2021.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 22
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 10
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
},
"DSA": {
"DSA": 1
}
},
"RSA": {
"RSA 1024": 12
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-PP 2010/04": 2
}
},
"cc_claims": {
"A": {
"A.ADMIN": 4,
"A.APPS-PROVIDER": 4,
"A.CAP_FILE": 1,
"A.CONTROLLING-": 1,
"A.CONTROLLING-AUTHORITY": 3,
"A.DELETION": 3,
"A.ISSUER": 4,
"A.KEY-ESCROW": 4,
"A.KEYS-PROT": 4,
"A.OS-UPDATE-EVIDENCE": 2,
"A.PERSONALISER": 4,
"A.PRODUCTION": 4,
"A.SCP-SUPP": 4,
"A.SECURE_ACODE_": 1,
"A.SECURE_ACODE_MANAGEMENT": 1,
"A.SEMS-APPS-PROVIDER": 2,
"A.SEMS-SERVICE-PROVIDER": 2,
"A.VERIFICATION": 1,
"A.VERIFICATION-": 1,
"A.VERIFICATION-AUTHORITY": 3
},
"D": {
"D.API_DATA": 1,
"D.APP_CODE": 2,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 3,
"D.APP_KEYS": 9,
"D.APSD_DAP_KEYS": 1,
"D.APSD_KEYS": 6,
"D.C": 1,
"D.CASD_DAP_KEYS": 1,
"D.CASD_KEYS": 4,
"D.CCCM_KEYS": 1,
"D.CLFDB-DK": 1,
"D.CONFIRMATION-DATA": 2,
"D.CRYPTO": 1,
"D.CTL_PRO": 5,
"D.CTL_REGISTRY": 5,
"D.CVM_MGMT_STATE": 3,
"D.CVM_PIN": 3,
"D.DAP_BLOCK": 1,
"D.ELF_AID": 3,
"D.ELF_APP_INS": 3,
"D.ELF_RG_DATA": 1,
"D.ELF_SESSION_ST": 2,
"D.GP_CODE": 2,
"D.GP_REGISTRY": 7,
"D.GS-PARAMETERS": 1,
"D.ISD_KEYS": 6,
"D.JCS_CODE": 4,
"D.JCS_DATA": 4,
"D.NEW_ELF": 3,
"D.OLD_ELF": 3,
"D.OS-": 4,
"D.OS-UPDATE-": 1,
"D.OS-UPDATE-CODE-ID": 2,
"D.OS-UPDATE_ADDITIONALCODE": 2,
"D.OS-UPDATE_DEC-KEY": 2,
"D.OS-UPDATE_SGNVER-": 1,
"D.OS-UPDATE_SGNVER-KEY": 1,
"D.PIN": 1,
"D.RECEIPT-": 1,
"D.RECEIPT-GENERATION-KEY": 1,
"D.SEC_DATA": 2,
"D.SEMS-APPLICATION-CODE": 1,
"D.SEMS-APPLICATION-DATA": 1,
"D.SEMS-PRIVATE-KEYS": 1,
"D.SEMS-PUBLIC-KEYS": 1,
"D.TOE_IDENTIFIER": 2,
"D.TOKEN-VERIFICATION-": 1,
"D.TOKEN-VERIFICATION-KEY": 1
},
"O": {
"O.ALARM": 3,
"O.APPLI-AUTH": 8,
"O.ARRAY_VIEWS_CONFID": 1,
"O.CARD-": 1,
"O.CARD-MANAGEMENT": 16,
"O.CCCM": 3,
"O.CIPHER": 5,
"O.CLFDB-": 1,
"O.CLFDB-DECIPHER": 3,
"O.COMM-": 3,
"O.COMM-AUTH": 10,
"O.COMM-CONFIDENTIALITY": 7,
"O.COMM-INTEGRITY": 10,
"O.CONFID-OS-": 3,
"O.CONFID-OS-UPDATE": 3,
"O.CRS_COUNTERS": 3,
"O.CRS_PRIVILEGES": 3,
"O.CTL_REGISTRY": 3,
"O.CTL_SC": 3,
"O.CVM-BLOCK": 6,
"O.CVM-MGMT": 7,
"O.DELETION": 4,
"O.DOMAIN-RIGHTS": 10,
"O.ELF_APP_DATA": 4,
"O.ELF_AUTHORISED": 3,
"O.ELF_DATA_PRO": 3,
"O.ELF_DELE_IRR": 3,
"O.ELF_INTEGRITY": 3,
"O.ELF_SESSION": 4,
"O.FIREWALL": 3,
"O.GLOBAL-CVM": 3,
"O.GLOBAL_ARRAYS_CONFID": 1,
"O.GLOBAL_ARRAYS_INTEG": 1,
"O.INSTALL": 5,
"O.KEY-MNGT": 3,
"O.LC-MANAGEMENT": 6,
"O.LOAD": 5,
"O.NATIVE": 1,
"O.NO-KEY-REUSE": 6,
"O.OBJ-DELETION": 1,
"O.OPERATE": 3,
"O.PIN-MNGT": 1,
"O.PRIVILEGES-": 2,
"O.PRIVILEGES-MANAGEMENT": 4,
"O.REALLOCATION": 1,
"O.RECEIPT": 3,
"O.RESOURCES": 3,
"O.RNG": 3,
"O.SECURE_AC_AC": 1,
"O.SECURE_AC_ACTIVATIO": 2,
"O.SECURE_AC_ACTIVATION": 2,
"O.SECURE_LOAD_": 1,
"O.SECURE_LOAD_ACODE": 5,
"O.SECURITY-": 1,
"O.SECURITY-DOMAINS": 5,
"O.SEMS-CCCM": 3,
"O.SEMS-COMMAND-": 2,
"O.SEMS-COMMAND-AUTH": 2,
"O.SEMS-OPEN": 4,
"O.SEMS-SCRIPT-AUTH": 4,
"O.SID": 3,
"O.TOE_IDENTIFICA": 1,
"O.TOE_IDENTIFICATION": 4,
"O.TOKEN": 3,
"O.TRANSACTION": 1
},
"OE": {
"OE.ADMIN": 4,
"OE.AID-MANAGEMENT": 4,
"OE.AP-KEYS": 4,
"OE.APPLICATIONS": 4,
"OE.APPS-PROVIDER": 4,
"OE.CA-KEYS": 4,
"OE.CAP_FILE": 1,
"OE.CARD-": 1,
"OE.CARD-MANAGEMENT": 2,
"OE.CLFDB-": 1,
"OE.CLFDB-ENC-PR": 2,
"OE.CODE-EVIDENCE": 1,
"OE.CONTROLLING-": 1,
"OE.CONTROLLING-AUTHORITY": 3,
"OE.DAP_BLOCK_GEN": 3,
"OE.ISD-KEYS": 4,
"OE.ISSUER": 4,
"OE.KEY-CHANGE": 4,
"OE.KEY-ESCROW": 4,
"OE.KEY-GENERATION": 4,
"OE.KEYS-PROT": 4,
"OE.LOADING": 4,
"OE.OS-UPDATE-": 1,
"OE.OS-UPDATE-ENCRYPTION": 4,
"OE.OS-UPDATE-EVIDENCE": 2,
"OE.PERSONALISER": 4,
"OE.PRODUCTION": 4,
"OE.RECEIPT-VER": 3,
"OE.SCP": 3,
"OE.SCP-SUPP": 4,
"OE.SECURE_ACODE_": 2,
"OE.SECURE_ACODE_MANAGEMENT": 1,
"OE.SEMS-APPS-": 1,
"OE.SEMS-APPS-PROVIDER": 2,
"OE.SEMS-SERVICE-": 1,
"OE.SEMS-SERVICE-PROVIDER": 2,
"OE.SERVERS": 4,
"OE.TOKEN-GEN": 3,
"OE.VA-KEYS": 1,
"OE.VERIFICATION": 1,
"OE.VERIFICATION-": 1,
"OE.VERIFICATION-AUTHORITY": 3
},
"OSP": {
"OSP.ADDITIONAL_CODE_": 2,
"OSP.ADDITIONAL_CODE_ENCRYPTION": 1,
"OSP.ADDITIONAL_CODE_SIGNING": 1,
"OSP.AID-MANAGEMENT": 4,
"OSP.APPLICATIONS": 4,
"OSP.APSD-KEYS": 4,
"OSP.ATOMIC_ACTIVATION": 2,
"OSP.CASD-KEYS": 4,
"OSP.CCCM": 2,
"OSP.CLFDB-": 1,
"OSP.CLFDB-ENC-PR": 1,
"OSP.DAP_BLOCK_GEN": 2,
"OSP.ELF_DELE_OP": 2,
"OSP.ISD-KEYS": 4,
"OSP.KEY-CHANGE": 4,
"OSP.KEY-GENERATION": 4,
"OSP.LOADING": 4,
"OSP.RECEIPT-VER": 2,
"OSP.SECURITY-": 1,
"OSP.SECURITY-DOMAINS": 3,
"OSP.SERVERS": 4,
"OSP.TOE_IDENTIFICATION": 2,
"OSP.TOKEN-GEN": 2,
"OSP.VERIFICATION": 2
},
"T": {
"T.BRUTE-": 1,
"T.BRUTE-FORCE-CVM": 1,
"T.BRUTE-FORCE-SCP": 5,
"T.CLFDB-DISC": 2,
"T.COM-EXPLOIT": 9,
"T.CONFID-APPLI-DATA": 1,
"T.CONFID-JCS-CODE": 1,
"T.CONFID-JCS-DATA": 1,
"T.CONFID-OS-UPDATE-LOAD": 2,
"T.COUNTERS-": 1,
"T.COUNTERS-FREEZE": 1,
"T.CRS-BYPASS": 2,
"T.CTL-AUTH-": 1,
"T.CTL-AUTH-FORGE": 1,
"T.CTL-REGISTRY-": 1,
"T.CTL-REGISTRY-OVERWRITE": 1,
"T.CVM-": 1,
"T.CVM-IMPERSONATE": 1,
"T.CVM-UPDATE": 2,
"T.DELETION": 2,
"T.ELF-DATA-ACCESS": 2,
"T.ELF-DATA-INTEGRITY": 2,
"T.ELF-ILL-COMMAND": 2,
"T.ELF-RES-DATA": 2,
"T.ELF-SESSION": 2,
"T.ELF-UNAUTHORISED": 2,
"T.ELF-VERSION": 2,
"T.EXE-CODE": 2,
"T.FAKE-SGNVER-KEY": 2,
"T.INSTALL": 2,
"T.INTEG-APPLI-CODE": 4,
"T.INTEG-APPLI-DATA": 4,
"T.INTEG-JCS-CODE": 1,
"T.INTEG-JCS-DATA": 1,
"T.INTEG-OS-UPDATE-LOAD": 2,
"T.LIFE-CYCLE": 5,
"T.NATIVE": 1,
"T.PHYSICAL": 1,
"T.RECEIPT": 2,
"T.RESOURCES": 1,
"T.SEMS-IMPERSONATE": 2,
"T.SID": 2,
"T.TOKEN": 2,
"T.UNAUTHORISED-": 3,
"T.UNAUTHORISED-CARD-": 1,
"T.UNAUTHORISED-CARD-MGMT": 8,
"T.UNAUTHORISED-TOE-": 1,
"T.UNAUTHORISED-TOE-CODE-UPDATE": 1,
"T.WRONG-UPDATE-STATE": 2
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP 2010/04": 2
},
"BSI": {
"BSI-CC-PP-0084-2014": 2,
"BSI-CC-PP-0099-V2-2020": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 4,
"ADV_FSP.2": 2,
"ADV_FSP.4": 9,
"ADV_IMP.1": 5,
"ADV_TDS.1": 2,
"ADV_TDS.2": 1,
"ADV_TDS.3": 9
},
"AGD": {
"AGD_OPE.1": 7,
"AGD_PRE.1": 6
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 2,
"ALC_DVS.2": 15,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_FUN.1": 6,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 17
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 14,
"EAL4 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1
},
"FCO": {
"FCO_NRO": 29,
"FCO_NRO.2": 12,
"FCO_NRR": 4,
"FCO_NRR.1": 3
},
"FCS": {
"FCS_CKM": 23,
"FCS_CKM.1": 16,
"FCS_CKM.2": 4,
"FCS_CKM.4": 29,
"FCS_COP": 79,
"FCS_COP.1": 17,
"FCS_RNG": 14,
"FCS_RNG.1": 10,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC": 45,
"FDP_ACC.1": 23,
"FDP_ACF": 41,
"FDP_ACF.1": 36,
"FDP_IFC": 53,
"FDP_IFC.1": 16,
"FDP_IFC.2": 6,
"FDP_IFF": 42,
"FDP_IFF.1": 21,
"FDP_ITC": 34,
"FDP_ITC.1": 11,
"FDP_ITC.2": 20,
"FDP_RIP": 11,
"FDP_ROL": 16,
"FDP_ROL.1": 6,
"FDP_SDI": 1,
"FDP_UCT": 5,
"FDP_UCT.1": 1,
"FDP_UIT": 11,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 9,
"FIA_AFL.1": 9,
"FIA_ATD": 5,
"FIA_ATD.1": 1,
"FIA_UAU": 25,
"FIA_UAU.1": 3,
"FIA_UAU.4": 1,
"FIA_UID": 32,
"FIA_UID.1": 14,
"FIA_USB": 1
},
"FMT": {
"FMT_MSA": 132,
"FMT_MSA.1": 14,
"FMT_MSA.3": 22,
"FMT_MTD": 21,
"FMT_MTD.1": 3,
"FMT_MTD.3": 1,
"FMT_SMF": 70,
"FMT_SMF.1": 16,
"FMT_SMR": 78,
"FMT_SMR.1": 26
},
"FPR": {
"FPR_UNO": 11,
"FPR_UNO.1": 3
},
"FPT": {
"FPT_FLS": 24,
"FPT_FLS.1": 4,
"FPT_RCV": 17,
"FPT_RCV.3": 4,
"FPT_RCV.3.1": 1,
"FPT_RCV.3.2": 1,
"FPT_RCV.3.3": 1,
"FPT_TDC": 9,
"FPT_TDC.1": 5
},
"FTP": {
"FTP_ITC": 33,
"FTP_ITC.1": 13,
"FTP_TRP": 7,
"FTP_TRP.1": 12
}
},
"certification_process": {
"OutOfScope": {
" \u2022 Post-issuance applications and security domains are out of scope of this PP": 1,
"and Dedicated Software defined in [PP-0084]. \u2022 Post-issuance applications and security domains are out of scope of this PP. The ST author may decide to extend this scope with applicative functionality. 28 /166": 1,
"i.e. how the corresponding security functions are implemented) is out of scope of this document": 1,
"out of scope": 2,
"these requirements are enforced (i.e. how the corresponding security functions are implemented) is out of scope of this document. Although the GlobalPlatform specifications offer a variety of mechanisms that can": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 9
},
"CCM": {
"CCM": 33
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 4
},
"TLS": {
"TLS": {
"TLS": 8,
"TLS 1.2": 1
}
}
},
"crypto_scheme": {
"AEAD": {
"AEAD": 1
},
"KA": {
"Key Agreement": 12,
"Key agreement": 2
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-256": 9,
"SHA-384": 4,
"SHA-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 31": 1,
"AIS20": 4,
"AIS31": 4
},
"FIPS": {
"FIPS 140-2": 4,
"FIPS 180-4": 2,
"FIPS 186-4": 2,
"FIPS 197": 3,
"FIPS 198": 4,
"FIPS PUB 140-2": 1,
"FIPS PUB 180-4": 1,
"FIPS PUB 186-4": 2
},
"ICAO": {
"ICAO": 4
},
"ISO": {
"ISO/IEC 10118-3": 1,
"ISO/IEC 19772:2009": 1,
"ISO/IEC 9797-1": 1
},
"NIST": {
"NIST SP 800-108": 1,
"NIST SP 800-131A": 1,
"NIST SP 800-38A": 1,
"NIST SP 800-38B": 1,
"NIST SP 800-56A": 2,
"NIST SP 800-56B": 1,
"NIST SP 800-57": 1,
"NIST SP 800-67": 1
},
"PKCS": {
"PKCS #1": 2,
"PKCS#1": 4
},
"RFC": {
"RFC 2119": 2,
"RFC 2616": 1,
"RFC 2818": 1,
"RFC 4279": 1,
"RFC 5246": 1,
"RFC 5639": 3,
"RFC 5758": 3
},
"SCP": {
"SCP02": 19,
"SCP03": 19,
"SCP10": 13,
"SCP11": 13,
"SCP21": 11,
"SCP22": 21,
"SCP80": 11,
"SCP81": 11
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 46,
"AES-128": 1
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 29
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"CMAC": 5,
"HMAC": 2,
"KMAC": 4
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-02102-1": 1,
"BSI TR-03111": 1
}
},
"tee_name": {
"IBM": {
"SE": 109
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_PSK_WITH_3DES_EDE_CBC_S": 1,
"TLS_PSK_WITH_AES_128_CBC_SH": 1,
"TLS_PSK_WITH_NULL_SHA": 1,
"TLS_PSK_WITH_NULL_SHA256": 1
}
},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "GlobalPlatform, Inc.",
"/Category": "",
"/Comments": "",
"/Company": "Internet of Trust (for GlobalPlatform)",
"/CreationDate": "D:20210217145949+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 21 for Word",
"/DocStatus": "Public Release",
"/Keywords": "",
"/Manager": "SE Security Working Group",
"/ModDate": "D:20210217150220+01\u002700\u0027",
"/Producer": "Adobe PDF Library 21.1.167",
"/SourceModified": "D:20210217135904",
"/Subject": "1.0",
"/Title": "Secure Element Protection Profile",
"pdf_file_size_bytes": 1643284,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://globalplatform.org/specifications/ip-disclaimers/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 166
},
"report_filename": "2020-37 INF-3429.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2020-37-INF-3429- v1": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-CC-PP-0099-V2-2020": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 4,
"ALC_FLR": 2
},
"APE": {
"APE_CCL.1": 5,
"APE_ECD.1": 5,
"APE_INT.1": 5,
"APE_OBJ.2": 5,
"APE_REQ.2": 5,
"APE_SPD.1": 5
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 6,
"EAL 4 augmented": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 7
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "9308",
"/CreationDate": "D:20210318184458+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20210318184458+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"pdf_file_size_bytes": 812423,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.sogis.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5bc7f86d061671c1e9305fe429030945b3a361d39d96c67fb0c06624b3b12089",
"txt_hash": "1d5d07b1e9863c2a49ce1a6cad1662e5f5af9e0f5b3c4eb9980f5e318b303bb6"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4f48ca9bdb6c256e7b111deb40270bd9ccd8cb3ec907b3fe442e36a7c475b92b",
"txt_hash": "2aaea3a69161453fcd5c474f98cd3fc28fb331d6babb0fbe0c6970ea11543684"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "Secure Element Protection Profile - GPC_SPE_174, version 1.0",
"not_valid_after": null,
"not_valid_before": "2021-03-18",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CCN-CC-PP-5-2021.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/2020-37 INF-3429.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"EAL4+"
]
},
"status": "active",
"version": "1.0"
}
}