Philips P5CC036V1C and P5CC009V1C Secure Smart Card Controller

CSV information ?

Status archived
Valid from 11.11.2004
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer Philips Semiconductors GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL5+, AVA_VLA.4, AVA_MSU.3, ALC_DVS.2

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0244-2004

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEA
Randomness
RNG
Engines
SmartMX

Vendor
Philips

Security level
EAL4, EAL 5, EAL 1, EAL 7, EAL 4, EAL5+, EAL5, EAL1, EAL3, EAL7, EAL2, EAL6, EAL 5 augmented, EAL5 augmented
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA.1, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_COP.1, FCS_RND.1, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_ITT.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_LIM.1, FMT_LIM.2, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FRU_FLT.2
Protection profiles
BSI-PP-0002-2001, BSI-PP- 0002-2001, BSI-PP-0002-
Certificates
BSI-DSZ-CC-0244-2004, BSI-DSZ-CC-0231-2004, BSI-DSZ-CC-0232-2004, BSI-DSZ-CC-0244, CC-0244
Certification process
2004, Evaluation of the Philips P5CC036V1C Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0244, Version 1.0, 15 October 2004, Evaluation of Philips, Technical Report, Philips P5CC036V1C Secure Smart Card Controller, Version 1.0, 19 October 2004 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German, to AIS 36, Version 1.0, 15 October 2004 for Philips P5CC036V1C Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CC036, BSI-DSZ- CC-0244, Version 1.1, Semiconductors, 30 September 2004 (confidential document) [12] Data Sheet, P5CC036, SmartMX, Secure Smart Card Controller, Objective Specification, Philips, Revision 3.0, 21 September 2004 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD, Mai 2001 [15] Configuration List for the P5CC036V1C, BSI-DSZ-CC-0244, Version 1.0, 12 October 2004 (confidential document) [16] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification, Card Controller, Objective Specification, Philips Semiconductors, Revision 3.0, 21 September 2004 (confidential document) BSI-DSZ-CC-0244-2004 Certification Report C-1 C Excerpts from the Criteria CC Part 1: Caveats on

Side-channel analysis
physical probing, side channel, DPA, timing attacks, physical tampering
Certification process
2004, Evaluation of the Philips P5CC036V1C Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0244, Version 1.0, 15 October 2004, Evaluation of Philips, Technical Report, Philips P5CC036V1C Secure Smart Card Controller, Version 1.0, 19 October 2004 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German, to AIS 36, Version 1.0, 15 October 2004 for Philips P5CC036V1C Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CC036, BSI-DSZ- CC-0244, Version 1.1, Semiconductors, 30 September 2004 (confidential document) [12] Data Sheet, P5CC036, SmartMX, Secure Smart Card Controller, Objective Specification, Philips, Revision 3.0, 21 September 2004 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD, Mai 2001 [15] Configuration List for the P5CC036V1C, BSI-DSZ-CC-0244, Version 1.0, 12 October 2004 (confidential document) [16] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification, Card Controller, Objective Specification, Philips Semiconductors, Revision 3.0, 21 September 2004 (confidential document) BSI-DSZ-CC-0244-2004 Certification Report C-1 C Excerpts from the Criteria CC Part 1: Caveats on

Standards
FIPS PUB 46-3, FIPS PUB 197, AIS 32, AIS 36, AIS 34, AIS 25, AIS 26, AIS 31, AIS31, ISO/IEC 15408:1999, ISO/IEC15408: 1999
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title: 0244a.PDF
Author: BSI
Creation date: D:20041112114010
Modification date: D:20041112114454+01'00'
Pages: 48
Creator: Microsoft Word - 0244a.doc
Producer: Acrobat PDFWriter 4.0 für Windows NT

Frontpage

Certificate ID: BSI-DSZ-CC-0244-2004
Certified item: Philips P5CC036V1C and P5CC009V1C Secure Smart Card Controller
Certification lab: BSI
Developer: Philips Semiconductors GmbH Business Line Identification

References

Outgoing Incoming
  • BSI-DSZ-CC-0311-2005 - Philips P5CC036V1C and P5CC009V1C with specific IC Dedicated Software Secure Smart Card Controller

Security target ?

Extracted keywords

Symmetric Algorithms
DES, DEA, Triple-DES, TDEA, Triple-DEA
Asymmetric Algorithms
ECC
Randomness
TRNG, RND, RNG
Engines
SmartMX

Vendor
Philips

Security level
EAL5, EAL 5, EAL4, EAL5+, EAL4+, EAL5 augmented, EAL 5 augmented, EAL4 augmented
Claims
O.RND, O.MF_FW, O.MEM_ACCESS, O.SFR_ACCESS, T.RND
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ACM_SCP.2, ACM_SCP, ACM_AUT, ACM_CAP, ADO_DEL.2, ADO_IGS.1, ADO_IGS, ADO_DEL, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, ADV_FSP.2, ADV_FSP, ADV_RCR, ADV_SPM, ADV_HLD, ADV_LLD, ADV_INT, ADV_IMP, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VLA.4, AVA_CCA.1, AVA_MSU.3, AVA_SOF.1, AVA_MSU
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RND.1, FCS_RND.1.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FCS_CKM, FDP_IFC.1, FDP_ITT.1, FDP_ITC.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FPT_AMT.1, FRU_FLT.2
Protection profiles
BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0244

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injection

Standards
FIPS PUB 46-3, FIPS PUB 46, AIS31

File metadata

Title: Security Target
Author: HGA
Creation date: D:20041018193649+02'00'
Modification date: D:20041018193728+02'00'
Pages: 73
Creator: Acrobat PDFMaker 6.0 for Word
Producer: Acrobat Distiller 6.0 (Windows)

References

Outgoing
Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-0244-2004

Extracted SARs

ALC_TAT.2, ADV_RCR.2, ADV_INT.1, ASE_INT.1, ALC_LCD.2, ADV_SPM.3, ADV_IMP.2, AGD_USR.1, ASE_OBJ.1, ATE_IND.2, ASE_TSS.1, ATE_COV.2, AVA_MSU.3, ASE_ENV.1, ASE_REQ.1, ATE_DPT.2, AVA_SOF.1, ASE_PPC.1, ADV_FSP.3, AGD_ADM.1, ALC_DVS.2, ADV_HLD.3, ASE_DES.1, ADV_LLD.1, ATE_FUN.1, ASE_SRE.1, AVA_VLA.4, AVA_CCA.1

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '94eeb7975314f1cb59b5335caefc9b48694016ebba3b1fef4b871f527c48c1e2', 'txt_hash': 'dfd25a11c981738607d23f0ad13cf3a3de7dc92f76e597f40629e333c6c4bdc0'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b07ecc052445509c3655b1929058b405b15a7085e299c6b251a6a9f6d5092ad5', 'txt_hash': '0c652bf6c65f25760668f9476875bcefd2ac88e05ea23b9fdc6e371caaafb4fa'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0244-2004', 'cert_item': 'Philips P5CC036V1C and P5CC009V1C Secure Smart Card Controller', 'developer': 'Philips Semiconductors GmbH Business Line Identification', 'cert_lab': 'BSI'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-0244': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0244': 4}, '__update__': {'BSI-DSZ-CC-0244-2004': 25, 'BSI-DSZ-CC-0231-2004': 1, 'BSI-DSZ-CC-0232-2004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0244': 75}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0244-2004': 50, 'BSI-DSZ-CC-0231-2004': 2, 'BSI-DSZ-CC-0232-2004': 2}, '__delete__': ['BSI-DSZ-CC-0244']}}, '__delete__': ['NL']}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-0244': 1}, 'CA': {'1 1 2': 5, '1 2 3': 5, '4 5 5': 1, '1 1 1': 11, '3 3 4': 1, '1 2 2': 6, '2 2 3': 2, '1 3 3': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0244': 4}, '__update__': {'BSI-DSZ-CC-0244-2004': 25, 'BSI-DSZ-CC-0231-2004': 1, 'BSI-DSZ-CC-0232-2004': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0244': 75}, 'CA': {'255 0 2': 1, '0 6 7': 1}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0311-2005']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0311-2005']}} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0244a.pdf, code: 408'].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to b07ecc052445509c3655b1929058b405b15a7085e299c6b251a6a9f6d5092ad5.
    • The st_txt_hash property was set to 0c652bf6c65f25760668f9476875bcefd2ac88e05ea23b9fdc6e371caaafb4fa.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 444125, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 73, '/ModDate': "D:20041018193728+02'00'", '/CreationDate': "D:20041018193649+02'00'", '/Title': 'Security Target', '/Creator': 'Acrobat PDFMaker 6.0 for Word', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'HGA', '/Company': 'Philips Semiconductors BL ID ', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 3}}, 'cc_security_level': {'EAL': {'EAL5': 35, 'EAL 5': 4, 'EAL4': 4, 'EAL5+': 1, 'EAL4+': 1, 'EAL5 augmented': 1, 'EAL 5 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 2, 'ACM_SCP.3': 5, 'ACM_SCP.2': 4, 'ACM_SCP': 3, 'ACM_AUT': 1, 'ACM_CAP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_IGS': 2, 'ADO_DEL': 2}, 'ADV': {'ADV_FSP.3': 6, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP.2': 4, 'ADV_FSP': 3, 'ADV_RCR': 4, 'ADV_SPM': 1, 'ADV_HLD': 1, 'ADV_LLD': 1, 'ADV_INT': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 2, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.4': 3, 'AVA_CCA.1': 1, 'AVA_MSU.3': 1, 'AVA_SOF.1': 2, 'AVA_MSU': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.1': 5, 'FCS_RND.1.1': 1, 'FCS_COP.1': 13, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 4, 'FCS_CKM.4': 3, 'FCS_CKM': 1}, 'FDP': {'FDP_IFC.1': 10, 'FDP_ITT.1': 6, 'FDP_ITC.1': 4, 'FDP_ACC.1': 33, 'FDP_ACC.1.1': 2, 'FDP_ACF.1': 30, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 3, 'FMT_MSA.2': 4, 'FMT_MSA.3': 22, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1': 29, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 2, 'FMT_SMF.1': 14, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_ITT.1': 6, 'FPT_PHP.3': 7, 'FPT_SEP.1': 6, 'FPT_AMT.1': 1}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3, 'O.MF_FW': 8, 'O.MEM_ACCESS': 8, 'O.SFR_ACCESS': 8}, 'T': {'T.RND': 2}}, 'vendor': {'Philips': {'Philips': 104}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 29, 'DEA': 2}, '3DES': {'Triple-DES': 10, 'TDEA': 3, 'Triple-DEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 11}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 2}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 14, 'Physical Probing': 2, 'physical probing': 1, 'DPA': 1, 'timing attacks': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 10, 'malfunction': 1, 'fault injection': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 46': 1}, 'BSI': {'AIS31': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 0244b.pdf.
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0244b.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0244a.pdf', 'st_filename': '0244b.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0244-2004': 50}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 3, 'EAL6': 3}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_LCD': 1}}}}, 'cc_claims': {'__update__': {'R': {'R.O': 1}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 6, 'DEA': 1}}}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'DPA': 1}, '__delete__': ['SPA']}}}, 'tee_name': {}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS PUB 46-3': 3}}, 'BSI': {'__update__': {'AIS 36': 6}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'__insert__': {'2004, Evaluation of the Philips P5CC036V1C Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0244, Version 1.0, 15 October 2004, Evaluation of Philips': 1, 'Technical Report, Philips P5CC036V1C Secure Smart Card Controller, Version 1.0, 19 October 2004 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German': 1, 'to AIS 36, Version 1.0, 15 October 2004 for Philips P5CC036V1C Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CC036, BSI-DSZ- CC-0244, Version 1.1': 1, 'Semiconductors, 30 September 2004 (confidential document) [12] Data Sheet, P5CC036, SmartMX, Secure Smart Card Controller, Objective Specification, Philips': 1, 'Revision 3.0, 21 September 2004 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD': 1}, '__delete__': ['st 2004, Evaluation of the Philips P5CC036V1C Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0244, Version 1.0, 15 October 2004, Evaluation of Philips', 'on Technical Report, Philips P5CC036V1C Secure Smart Card Controller, Version 1.0, 19 October 2004 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German', 'ording to AIS 36, Version 1.0, 15 October 2004 for Philips P5CC036V1C Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CC036, BSI-DSZ- CC-0244, Version 1.1', 'Philips Semiconductors, 30 September 2004 (confidential document) [12] Data Sheet, P5CC036, SmartMX, Secure Smart Card Controller, Objective Specification, Philips', 'Semiconductors, Revision 3.0, 21 September 2004 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD ']}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL4 augmented': 1}, '__update__': {'EAL 5': 4, 'EAL 5 augmented': 2}}}}, 'cc_sar': {'__update__': {'ACM': {'__update__': {'ACM_SCP.2': 4}}, 'ADV': {'__update__': {'ADV_FSP.3': 6, 'ADV_FSP.2': 4}}, 'AVA': {'__update__': {'AVA_SOF.1': 2}}}}, 'cc_sfr': {'__update__': {'FCS': {'__insert__': {'FCS_COP.1': 13}, '__update__': {'FCS_RND.1': 5, 'FCS_CKM.4': 3}}, 'FDP': {'__update__': {'FDP_ACC.1': 33, 'FDP_ACF.1': 30}}, 'FMT': {'__update__': {'FMT_MSA.3': 22, 'FMT_MSA.1': 29, 'FMT_SMR.1': 8, 'FMT_SMF.1': 14}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.MEM_ACCESS': 8}}}}, 'vendor': {'__update__': {'Philips': {'__update__': {'Philips': 104}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 29, 'DEA': 2}}}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 11}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'Leak-Inherent': 14, 'DPA': 1}, '__delete__': ['SPA']}, 'FI': {'__insert__': {'physical tampering': 1}, '__update__': {'Malfunction': 10}}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0244-2004': 94, 'BSI-DSZ-CC-0231-2004': 2, 'BSI-DSZ-CC-0232-2004': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 4, 'BSI-PP- 0002-2001': 1, 'BSI-PP-0002-': 1}}, 'cc_security_level': {'EAL': {'EAL4': 9, 'EAL 5': 1, 'EAL 1': 1, 'EAL 7': 1, 'EAL 4': 1, 'EAL5+': 2, 'EAL5': 9, 'EAL1': 5, 'EAL2': 4, 'EAL3': 4, 'EAL6': 4, 'EAL7': 4, 'EAL 5 augmented': 1, 'EAL5 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_SCP.3': 2, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_DEL': 2, 'ADO_IGS': 2}, 'ADV': {'ADV_FSP.3': 1, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 5, 'ALC_LCD.2': 2, 'ALC_TAT.2': 2, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 2, 'ALC_TAT': 2}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 4, 'AVA_VLA.4': 5, 'AVA_CCA.1': 1, 'AVA_SOF.1': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 4, 'AVA_VLA': 4, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_COP.1': 1, 'FCS_RND.1': 1}, 'FDP': {'FDP_ACC.1': 3, 'FDP_ACF.1': 3, 'FDP_IFC.1': 1, 'FDP_ITT.1': 1}, 'FMT': {'FMT_MSA.1': 2, 'FMT_MSA.3': 2, 'FMT_SMF.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_ITT.1': 1, 'FPT_PHP.3': 1, 'FPT_SEP.1': 1}, 'FRU': {'FRU_FLT.2': 1}}, 'cc_claims': {'O': {'O.C': 1}, 'R': {'R.O.C': 1}}, 'vendor': {'Philips': {'Philips': 55}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 23, 'DEA': 3}, '3DES': {'Triple-DES': 13, 'TDEA': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 5}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 6}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'side channel': 1, 'SPA': 3, 'DPA': 4, 'timing attacks': 1}, 'FI': {'physical tampering': 1}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 2, 'FIPS PUB 197': 1}, 'BSI': {'AIS 32': 3, 'AIS 36': 5, 'AIS 34': 2, 'AIS 25': 2, 'AIS 26': 3, 'AIS 31': 4, 'AIS31': 1}, 'ISO': {'ISO/IEC 15408:1999': 1, 'ISO/IEC15408: 1999': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'st 2004, Evaluation of the Philips P5CC036V1C Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0244, Version 1.0, 15 October 2004, Evaluation of Philips': 1, 'on Technical Report, Philips P5CC036V1C Secure Smart Card Controller, Version 1.0, 19 October 2004 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German': 1, 'ording to AIS 36, Version 1.0, 15 October 2004 for Philips P5CC036V1C Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CC036, BSI-DSZ- CC-0244, Version 1.1': 1, 'Philips Semiconductors, 30 September 2004 (confidential document) [12] Data Sheet, P5CC036, SmartMX, Secure Smart Card Controller, Objective Specification, Philips': 1, 'Semiconductors, Revision 3.0, 21 September 2004 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD ': 1, 'Mai 2001 [15] Configuration List for the P5CC036V1C, BSI-DSZ-CC-0244, Version 1.0, 12 October 2004 (confidential document) [16] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification': 1, 'Card Controller, Objective Specification, Philips Semiconductors, Revision 3.0, 21 September 2004 (confidential document) BSI-DSZ-CC-0244-2004 Certification Report C-1 C Excerpts from the Criteria CC Part 1: Caveats on': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 3}}, 'cc_security_level': {'EAL': {'EAL5': 35, 'EAL 5': 3, 'EAL4': 4, 'EAL5+': 1, 'EAL4+': 1, 'EAL5 augmented': 1, 'EAL 5 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 2, 'ACM_SCP.3': 5, 'ACM_SCP.2': 3, 'ACM_SCP': 3, 'ACM_AUT': 1, 'ACM_CAP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_IGS': 2, 'ADO_DEL': 2}, 'ADV': {'ADV_FSP.3': 5, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP.2': 3, 'ADV_FSP': 3, 'ADV_RCR': 4, 'ADV_SPM': 1, 'ADV_HLD': 1, 'ADV_LLD': 1, 'ADV_INT': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 2, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.4': 3, 'AVA_CCA.1': 1, 'AVA_MSU.3': 1, 'AVA_SOF.1': 1, 'AVA_MSU': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.1': 4, 'FCS_RND.1.1': 1, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 4, 'FCS_CKM.4': 4, 'FCS_CKM': 1}, 'FDP': {'FDP_IFC.1': 10, 'FDP_ITT.1': 6, 'FDP_ITC.1': 4, 'FDP_ACC.1': 11, 'FDP_ACC.1.1': 2, 'FDP_ACF.1': 10, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 3, 'FMT_MSA.2': 4, 'FMT_MSA.3': 6, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1': 11, 'FMT_SMR.1': 10, 'FMT_MSA.1.1': 2, 'FMT_SMF.1': 15, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_ITT.1': 6, 'FPT_PHP.3': 7, 'FPT_SEP.1': 6, 'FPT_AMT.1': 1}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3, 'O.MF_FW': 8, 'O.MEM_ACCESS': 9, 'O.SFR_ACCESS': 8}, 'T': {'T.RND': 2}}, 'vendor': {'Philips': {'Philips': 103}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 45, 'DEA': 8}, '3DES': {'Triple-DES': 10, 'TDEA': 3, 'Triple-DEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 13}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 2}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 13, 'Physical Probing': 2, 'physical probing': 1, 'SPA': 1, 'DPA': 2, 'timing attacks': 2}, 'FI': {'Malfunction': 11, 'malfunction': 1, 'fault injection': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 46': 1}, 'BSI': {'AIS31': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 3}]} values discarded.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '94eeb7975314f1cb59b5335caefc9b48694016ebba3b1fef4b871f527c48c1e2', 'st_pdf_hash': 'b07ecc052445509c3655b1929058b405b15a7085e299c6b251a6a9f6d5092ad5', 'report_txt_hash': 'dfd25a11c981738607d23f0ad13cf3a3de7dc92f76e597f40629e333c6c4bdc0', 'st_txt_hash': '0c652bf6c65f25760668f9476875bcefd2ac88e05ea23b9fdc6e371caaafb4fa'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 1, 'DES': 23, 'TDEA': 2, 'DEA': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'RNG': 5}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'physical probing': 2, 'physical tampering': 1, 'side channel': 1, 'DPA': 4, 'timing attacks': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'DES': 45, 'TDEA': 3, 'DEA': 5}, 'rules_asymmetric_crypto': {'ECC': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'TRNG': 1, 'RND': 5, 'RNG': 13}, 'rules_tee': {}, 'rules_side_channels': {'Malfunction': 11, 'malfunction': 1, 'Leak-Inherent': 13, 'Physical Probing': 2, 'physical probing': 1, 'DPA': 2, 'fault injection': 3, 'timing attacks': 2}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_DES', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0311-2005']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0311-2005']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0232-2004', 'BSI-DSZ-CC-0231-2004']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0232-2004', 'BSI-DSZ-CC-0231-2004']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0311-2005']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Philips P5CC036V1C and P5CC009V1C Secure Smart Card Controller was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "774cb0f28f7900f9",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0244-2004",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_CCA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ENV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_DES",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_PPC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0311-2005"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0232-2004",
          "BSI-DSZ-CC-0231-2004"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0311-2005"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0232-2004",
          "BSI-DSZ-CC-0231-2004"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Philips Semiconductors GmbH",
  "manufacturer_web": "https://www.philips.com/",
  "name": "Philips P5CC036V1C and P5CC009V1C Secure Smart Card Controller",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2004-11-11",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0244a.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0244-2004",
        "cert_item": "Philips P5CC036V1C and P5CC009V1C Secure Smart Card Controller",
        "cert_lab": "BSI",
        "developer": "Philips Semiconductors GmbH Business Line Identification",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0231-2004": 1,
          "BSI-DSZ-CC-0232-2004": 1,
          "BSI-DSZ-CC-0244": 4,
          "BSI-DSZ-CC-0244-2004": 25
        },
        "NL": {
          "CC-0244": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 1
        },
        "R": {
          "R.O": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0002-2001": 1,
          "BSI-PP-0002-": 1,
          "BSI-PP-0002-2001": 4
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_AUT.1": 2,
          "ACM_CAP": 2,
          "ACM_CAP.4": 2,
          "ACM_SCP": 2,
          "ACM_SCP.3": 2
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 2,
          "ADO_IGS": 2,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_FSP.3": 1,
          "ADV_HLD": 2,
          "ADV_HLD.3": 1,
          "ADV_IMP": 2,
          "ADV_IMP.2": 1,
          "ADV_INT": 2,
          "ADV_INT.1": 1,
          "ADV_LLD": 2,
          "ADV_LLD.1": 1,
          "ADV_RCR": 2,
          "ADV_RCR.2": 1,
          "ADV_SPM": 2,
          "ADV_SPM.3": 1
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_ADM.1": 1,
          "AGD_USR": 2,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.2": 5,
          "ALC_FLR": 2,
          "ALC_LCD": 1,
          "ALC_LCD.2": 2,
          "ALC_TAT": 2,
          "ALC_TAT.2": 2
        },
        "ASE": {
          "ASE_DES.1": 1,
          "ASE_ENV.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_PPC.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SRE.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_COV.2": 1,
          "ATE_DPT": 2,
          "ATE_DPT.2": 1,
          "ATE_FUN": 2,
          "ATE_FUN.1": 1,
          "ATE_IND": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_CCA.1": 1,
          "AVA_MSU": 2,
          "AVA_MSU.3": 4,
          "AVA_SOF": 4,
          "AVA_SOF.1": 1,
          "AVA_VLA": 4,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 1,
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 9,
          "EAL5": 9,
          "EAL5 augmented": 2,
          "EAL5+": 2,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_COP.1": 1,
          "FCS_RND.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 3,
          "FDP_ACF.1": 3,
          "FDP_IFC.1": 1,
          "FDP_ITT.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MSA.1": 2,
          "FMT_MSA.3": 2,
          "FMT_SMF.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 1,
          "FPT_SEP.1": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "2004, Evaluation of the Philips P5CC036V1C Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0244, Version 1.0, 15 October 2004, Evaluation of Philips": 1,
          "Card Controller, Objective Specification, Philips Semiconductors, Revision 3.0, 21 September 2004 (confidential document) BSI-DSZ-CC-0244-2004 Certification Report C-1 C Excerpts from the Criteria CC Part 1: Caveats on": 1,
          "Mai 2001 [15] Configuration List for the P5CC036V1C, BSI-DSZ-CC-0244, Version 1.0, 12 October 2004 (confidential document) [16] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification": 1,
          "Revision 3.0, 21 September 2004 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD": 1,
          "Semiconductors, 30 September 2004 (confidential document) [12] Data Sheet, P5CC036, SmartMX, Secure Smart Card Controller, Objective Specification, Philips": 1,
          "Technical Report, Philips P5CC036V1C Secure Smart Card Controller, Version 1.0, 19 October 2004 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German": 1,
          "to AIS 36, Version 1.0, 15 October 2004 for Philips P5CC036V1C Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CC036, BSI-DSZ- CC-0244, Version 1.1": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 6
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 5
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "physical probing": 2,
          "side channel": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 25": 2,
          "AIS 26": 3,
          "AIS 31": 4,
          "AIS 32": 3,
          "AIS 34": 2,
          "AIS 36": 6,
          "AIS31": 1
        },
        "FIPS": {
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 3
        },
        "ISO": {
          "ISO/IEC 15408:1999": 1,
          "ISO/IEC15408: 1999": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 2,
            "Triple-DES": 13
          },
          "DES": {
            "DEA": 1,
            "DES": 6
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Philips": {
          "Philips": 55
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "BSI",
      "/CreationDate": "D:20041112114010",
      "/Creator": "Microsoft Word - 0244a.doc",
      "/ModDate": "D:20041112114454+01\u002700\u0027",
      "/Producer": "Acrobat PDFWriter 4.0 f\u00fcr Windows NT",
      "/Title": "0244a.PDF",
      "pdf_file_size_bytes": 198742,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 48
    },
    "st_filename": "0244b.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0244": 75
        }
      },
      "cc_claims": {
        "O": {
          "O.MEM_ACCESS": 8,
          "O.MF_FW": 8,
          "O.RND": 3,
          "O.SFR_ACCESS": 8
        },
        "T": {
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 3
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_AUT.1": 1,
          "ACM_CAP": 1,
          "ACM_CAP.4": 2,
          "ACM_SCP": 3,
          "ACM_SCP.2": 4,
          "ACM_SCP.3": 5
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 2,
          "ADO_IGS": 2,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP": 3,
          "ADV_FSP.2": 4,
          "ADV_FSP.3": 6,
          "ADV_HLD": 1,
          "ADV_HLD.3": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_LLD": 1,
          "ADV_LLD.1": 1,
          "ADV_RCR": 4,
          "ADV_RCR.2": 1,
          "ADV_SPM": 1,
          "ADV_SPM.3": 1
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_ADM.1": 2,
          "AGD_USR": 2,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_LCD": 1,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.2": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA.1": 1,
          "AVA_MSU": 2,
          "AVA_MSU.3": 1,
          "AVA_SOF.1": 2,
          "AVA_VLA.4": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 4,
          "EAL 5 augmented": 2,
          "EAL4": 4,
          "EAL4 augmented": 1,
          "EAL4+": 1,
          "EAL5": 35,
          "EAL5 augmented": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 4
        },
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 4,
          "FCS_CKM.4": 3,
          "FCS_COP.1": 13,
          "FCS_COP.1.1": 1,
          "FCS_RND.1": 5,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 33,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 30,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 10,
          "FDP_ITC.1": 4,
          "FDP_ITT.1": 6,
          "FDP_SDI.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 3,
          "FMT_LIM.2": 3,
          "FMT_MSA.1": 29,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.2": 4,
          "FMT_MSA.3": 22,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 8
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_FLS.1": 7,
          "FPT_ITT.1": 6,
          "FPT_PHP.3": 7,
          "FPT_SEP.1": 6
        },
        "FRU": {
          "FRU_FLT.2": 7
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 2
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 5,
          "RNG": 11
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 10,
          "fault injection": 3,
          "malfunction": 1,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 14,
          "Physical Probing": 2,
          "physical probing": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 3
        },
        "FIPS": {
          "FIPS PUB 46": 1,
          "FIPS PUB 46-3": 3
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "TDEA": 3,
            "Triple-DEA": 1,
            "Triple-DES": 10
          },
          "DES": {
            "DEA": 2,
            "DES": 29
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Philips": {
          "Philips": 104
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "HGA",
      "/Company": "Philips Semiconductors BL ID ",
      "/CreationDate": "D:20041018193649+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 6.0 for Word",
      "/ModDate": "D:20041018193728+02\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "Security Target",
      "pdf_file_size_bytes": 444125,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 73
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0244a.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_MSU.3",
      "ALC_DVS.2",
      "AVA_VLA.4",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0244b.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "94eeb7975314f1cb59b5335caefc9b48694016ebba3b1fef4b871f527c48c1e2",
      "txt_hash": "dfd25a11c981738607d23f0ad13cf3a3de7dc92f76e597f40629e333c6c4bdc0"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b07ecc052445509c3655b1929058b405b15a7085e299c6b251a6a9f6d5092ad5",
      "txt_hash": "0c652bf6c65f25760668f9476875bcefd2ac88e05ea23b9fdc6e371caaafb4fa"
    }
  },
  "status": "archived"
}