NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0

CSV information ?

Status archived
Valid from 03.07.2008
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer NXP Semiconductors
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VLA.4, EAL5+, AVA_MSU.3, ALC_DVS.2
Maintenance updates NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.1 (30.09.2008) Certification report Security target

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0440-2008

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES
Asymmetric Algorithms
ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-224
Schemes
Key Exchange
Randomness
RNG
Engines
SmartMX
Libraries
Crypto Library 2.0

Vendor
NXP, NXP Semiconductors, Infineon Technologies AG, Philips

Security level
EAL 5, EAL 4, EAL4, EAL 1, EAL 7, EAL5+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 5 augmented
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ACM_SCP.3, ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_RCR.2, ADV_SPM.3, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_DPT.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_CCA.1, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSS
Protection profiles
BSI-CC-PP-0002-2001, BSI-CC-PP-0002_2001, BSI-PP-0002-2001, BSI-PP-0002
Certificates
BSI-DSZ-CC-0440-2008, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-410-2007
Evaluation facilities
Brightsight
Certification process
1.1, 07 November 2007, Secured Crypto Library on the P5CD144V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi, Technical Report, 4.0, 16 May 2008, Secured Crypto Library on the P5CD144V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8, AIS 36 for the Product Secured Crypto Library on the P5CD144V0B, 5.0, 16 May 2008, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items

Side-channel analysis
physical probing, Side channel, side channel, fault injection, JIL
Certification process
1.1, 07 November 2007, Secured Crypto Library on the P5CD144V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi, Technical Report, 4.0, 16 May 2008, Secured Crypto Library on the P5CD144V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8, AIS 36 for the Product Secured Crypto Library on the P5CD144V0B, 5.0, 16 May 2008, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items

Standards
FIPS 180-1, AIS 34, AIS 20, AIS 25, AIS 26, AIS 31, AIS 35, AIS 36, AIS 32, AIS 38, ISO/IEC 15408:2005
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title: Zertifizierungsreport BSI-DSZ-CC-0440-2008
Subject: Common Criteria Zertifizierung
Keywords: "NXP Smart Card Controller P5CD144V0Bwith IC deicated software:Secured Crypto Library Release 2.0, BSI-DSZ-CC-0440-2008, NXP Semiconductors Germany GmbH, Common Criteria, Zertifizierung"
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20080711074302+02'00'
Modification date: D:20080715141150+02'00'
Pages: 34
Creator: Writer
Producer: StarOffice 8

Frontpage

Certificate ID: BSI-DSZ-CC-0440-2008
Certified item: NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.0
Certification lab: BSI
Developer: NXP Semiconductors Germany GmbH

References

Outgoing
  • BSI-DSZ-CC-0411-2007 - NXP Secure Smart Card Controller P5CD144V0B, P5CN144V0B and P5CC144V0B each with specific IC Dedicated Software
  • BSI-DSZ-CC-0417-2008 - NXP Smart Card Controller P5CD080V0B with Dedicated software: Secured Crypto Library Release 2.0

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DEA, DES, Triple-DES, 3DES, TDES, CBC-MAC
Asymmetric Algorithms
RSA-CRT, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256
Schemes
MAC, Key Exchange
Randomness
TRNG, RND, RNG
Engines
SmartMX
Block cipher modes
ECB, CBC

Vendor
NXP Semiconductors, NXP, Infineon Technologies, Philips

Security level
EAL5, EAL 5, EAL5+, EAL4+, EAL4, EAL5 augmented, EAL 5 augmented, EAL4 augmented
Claims
O.RND, O.HW_AES, O.MF_FW, O.MEM_ACCESS, O.SFR_ACCESS, O.CONFIG, O.AES, O.RSA, O.ECC, O.ECC_DHKE, O.SHA, O.COPY, O.REUSE, O.ECC_DHKA, T.RND
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_SPM.1, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_SOF.1, AVA_CCA.1, ASE_REQ
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RND.1, FCS_RND.2, FCS_COP.1, FCS_CKM.1, FCS_RND, FCS_COP.1.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2, FCS_RND.2.1, FCS_CKM, FCS_COP, FCS_RND.1.1, FDP_IFC.1, FDP_ITT.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ITC.1, FDP_RIP, FDP_RIP.1.1, FDP_ITT, FDP_ITT.1.1, FDP_SDI.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_MSA.2, FMT_SMR.1, FMT_MOF.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FPT_FLS.1.1, FPT_TST.2, FPT_TST, FPT_TST.2.1, FPT_AMT.1, FPT_ITT, FPT_ITT.1.1, FPT_TST.1, FPT_AMT, FPT_RVM, FPT_RND.1, FPT_RND.2, FRU_FLT.2
Protection profiles
BSI-PP- 0002-2001, BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0411-2007

Side-channel analysis
Leak-Inherent, Physical Probing, side-channel, side channel, SPA, DPA, timing attacks, Timing attacks, Timing attack, Malfunction, malfunction, DFA, fault induction, fault injection

Standards
FIPS PUB 81, FIPS 180-2, FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 180-2, PKCS #1, AIS31, AIS20, ISO/IEC 15946-2, ISO/IEC 15946-1, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title: Security Target Lite - Secured Crypto Library on the P5CD144V0B
Subject: Common Criteria Evaluation of Crypto Library on SmartMX
Keywords: Crypto Library, SmartMX, P5CD144, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA
Author: Andreas Kühn
Creation date: D:20071107141301+01'00'
Modification date: D:20080624155809+02'00'
Pages: 77
Creator: Acrobat PDFMaker 7.0.7 for Word
Producer: Acrobat Distiller 7.0.5 (Windows)

References

Outgoing
  • BSI-DSZ-CC-0411-2007 - NXP Secure Smart Card Controller P5CD144V0B, P5CN144V0B and P5CC144V0B each with specific IC Dedicated Software

Heuristics ?

Certificate ID: BSI-DSZ-CC-0440-2008

Extracted SARs

ADV_INT.1, ATE_DPT.2, ADV_SPM.3, AGD_USR.1, ALC_LCD.2, AVA_CCA.1, AVA_VLA.4, ALC_DVS.2, ADV_LLD.1, ADV_FSP.3, ATE_FUN.1, AVA_SOF.1, ATE_COV.2, ATE_IND.2, AGD_ADM.1, AVA_MSU.3, ADV_IMP.2, ADV_RCR.2, ADV_HLD.3, ALC_TAT.2

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0 was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2.0']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0411-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0411-2007']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0411-2007', 'BSI-DSZ-CC-410-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0404-2007', 'BSI-DSZ-CC-0411-2007', 'BSI-DSZ-CC-410-2007']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 3}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 2}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '16c4bb0e1301bfc73b8ae0c08343cde53f79af838e9271aa8d8a0bf592e9d871', 'st_pdf_hash': '96260b763de45562884f6a97a8a597321748abdc8b03a69baba451afbaacf2b7', 'report_txt_hash': '11be0ce2f917f515447f15d0c8f9ddc13d306d96f748cb60f58b92520cfdd7b3', 'st_txt_hash': '715b48476bc3e63f08767b6b594c008daaa34dbb4135fec6b1d038dff52634d5'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 8, 'DES': 11, '3DES': 1}, 'rules_asymmetric_crypto': {'ECDSA': 4, 'ECC': 13, 'Diffie-Hellman': 2, 'DSA': 4}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 5, 'SHA-256': 5, 'SHA-224': 5}, 'rules_crypto_schemes': {'Key Exchange': 2}, 'rules_randomness': {'RNG': 2}, 'rules_tee': {}, 'rules_side_channels': {'physical probing': 1, 'Side channel': 1, 'side channel': 1, 'fault injection': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 68, 'DEA': 1, 'DES': 89, '3DES': 17, 'TDES': 1}, 'rules_asymmetric_crypto': {'ECDSA': 5, 'ECC': 66, 'Diffie-Hellman': 12, 'DSA': 5}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 14, 'SHA-224': 10, 'SHA-256': 11}, 'rules_crypto_schemes': {'MAC': 14, 'Key Exchange': 10}, 'rules_randomness': {'TRNG': 1, 'RNG': 93, 'RND': 27}, 'rules_tee': {'SE': 6}, 'rules_side_channels': {'Malfunction': 13, 'malfunction': 2, 'Leak-Inherent': 12, 'Physical Probing': 2, 'side-channel': 7, 'side channel': 15, 'SPA': 27, 'DPA': 25, 'DFA': 37, 'fault induction': 1, 'fault injection': 1, 'Timing attacks': 3, 'timing attacks': 8, 'Timing attack': 1}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/8424207a5053802b.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/8424207a5053802b.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.bsi.bund.de/']}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0440-2008': 68, 'BSI-DSZ-CC-0411-2007': 4, 'BSI-DSZ-CC-410-2007': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0002-2001': 2, 'BSI-CC-PP-0002_2001': 1, 'BSI-PP-0002-2001': 1, 'BSI-PP-0002.2001': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 4, 'EAL 4': 6, 'EAL4': 6, 'EAL 1': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL1': 5, 'EAL2': 4, 'EAL3': 4, 'EAL5': 6, 'EAL6': 4, 'EAL7': 4, 'EAL 5 augmented': 4}}, 'cc_sar': {'ACM': {'ACM_SCP.3': 2, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2, 'ACM_AUT.1': 1, 'ACM_CAP.4': 1}, 'ADO': {'ADO_DEL': 2, 'ADO_IGS': 2, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.3': 1, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.2': 2, 'ALC_TAT.2': 2, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 2, 'ALC_TAT': 2}, 'ATE': {'ATE_DPT.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 4, 'AVA_CCA.1': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA': 3, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'APE': {'APE_DES': 1, 'APE_ENV': 1, 'APE_INT': 1, 'APE_OBJ': 1, 'APE_REQ': 1, 'APE_SRE': 1}, 'ASE': {'ASE_DES': 1, 'ASE_ENV': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_PPC': 1, 'ASE_REQ': 1, 'ASE_SRE': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 2}, 'R': {'R.O.C': 2}}, 'vendor': {'NXP': {'NXP': 15, 'NXP Semiconductors': 26}, 'Infineon': {'Infineon Technologies AG': 1}, 'Philips': {'Philips': 1}}, 'eval_facility': {'BrightSight': {'Brightsight': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 12}, '3DES': {'Triple-DES': 2, '3DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 13}}, 'FF': {'DH': {'Diffie-Hellman': 2}, 'DSA': {'DSA': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5}, 'SHA2': {'SHA-256': 5, 'SHA-224': 5}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 11}}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library 2.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'Side channel': 1, 'side channel': 1}, 'FI': {'fault injection': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 3, 'AIS 20': 2, 'AIS 25': 3, 'AIS 26': 3, 'AIS 31': 3, 'AIS 35': 2, 'AIS 36': 2, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408:2005': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'n 1.1, 07 November 2007, Secured Crypto Library on the P5CD144V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi': 1, 'ation Technical Report, 4.0, 16 May 2008, Secured Crypto Library on the P5CD144V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8': 1, 'AIS 36 for the Product Secured Crypto Library on the P5CD144V0B, 5.0, 16 May 2008, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items ': 1, 'confidential document) [12] NXP Semiconductors User Guidance: Secured Crypto Library on the P5Cx02x/040/080/144 Family': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0411-2007': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP- 0002-2001': 9, 'BSI-PP-0002-2001': 8}}, 'cc_security_level': {'EAL': {'EAL5': 31, 'EAL 5': 3, 'EAL5+': 8, 'EAL4+': 2, 'EAL4': 2, 'EAL 5 augmented': 1, 'EAL5 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_SCP.3': 3, 'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_SPM.1': 1, 'ADV_FSP.3': 3, 'ADV_HLD.3': 2, 'ADV_IMP.2': 4, 'ADV_INT.1': 2, 'ADV_LLD.1': 2, 'ADV_RCR.2': 2, 'ADV_SPM.3': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.2': 2, 'ALC_TAT.2': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_MSU.3': 6, 'AVA_VLA.4': 5, 'AVA_SOF.1': 4, 'AVA_CCA.1': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.1': 15, 'FCS_RND.2': 32, 'FCS_RND': 6, 'FCS_CKM.1': 31, 'FCS_CKM.4': 20, 'FCS_CKM.2': 14, 'FCS_COP.1': 17, 'FCS_RND.2.1': 2, 'FCS_CKM': 2, 'FCS_COP': 1, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_IFC.1': 34, 'FDP_ITT.1': 27, 'FDP_RIP.1': 9, 'FDP_ITC.1': 18, 'FDP_RIP.1.1': 1, 'FDP_ACC.1': 6, 'FDP_SDI.1': 1, 'FDP_ACF.1': 2, 'FDP_RIP': 1}, 'FMT': {'FMT_LIM.1': 2, 'FMT_LIM.2': 2, 'FMT_SMF.1': 5, 'FMT_MSA.2': 20, 'FMT_SMR.1': 9, 'FMT_MSA.3': 3, 'FMT_MSA.1': 3, 'FMT_MOF.1': 1}, 'FPT': {'FPT_FLS.1': 27, 'FPT_ITT.1': 27, 'FPT_PHP.3': 6, 'FPT_FLS.1.1': 1, 'FPT_TST.2': 29, 'FPT_TST': 11, 'FPT_TST.2.1': 2, 'FPT_AMT.1': 5, 'FPT_SEP.1': 5, 'FPT_TST.1': 12, 'FPT_RND.1': 1, 'FPT_RND.2': 1}, 'FRU': {'FRU_FLT.2': 15}}, 'cc_claims': {'O': {'O.RND': 15, 'O.HW_AES': 3, 'O.MF_FW': 4, 'O.MEM_ACCESS': 6, 'O.SFR_ACCESS': 4, 'O.CONFIG': 2, 'O.AES': 6, 'O.RSA': 6, 'O.ECC': 7, 'O.ECC_DHKE': 3, 'O.SHA': 7, 'O.COPY': 7, 'O.REUSE': 6, 'O.ECC_DHKA': 3}, 'T': {'T.RND': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 103, 'NXP': 98}, 'Infineon': {'Infineon Technologies': 1}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 68}}, 'DES': {'DES': {'DEA': 1, 'DES': 107}, '3DES': {'3DES': 17, 'Triple-DES': 19, 'TDES': 1}}, 'constructions': {'MAC': {'CBC-MAC': 12}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 3}, 'ECC': {'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 66}}, 'FF': {'DH': {'Diffie-Hellman': 12}, 'DSA': {'DSA': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 14}, 'SHA2': {'SHA-224': 10, 'SHA-256': 11}}}, 'crypto_scheme': {'MAC': {'MAC': 14}, 'KEX': {'Key Exchange': 10}, 'KA': {'KA': 6}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 93, 'RND': 27}}, 'cipher_mode': {'ECB': {'ECB': 15}, 'CBC': {'CBC': 23}}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 116}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 12, 'Physical Probing': 2, 'side-channel': 7, 'side channel': 15, 'SPA': 28, 'DPA': 25, 'Timing attacks': 3, 'timing attacks': 8, 'Timing attack': 1}, 'FI': {'Malfunction': 13, 'malfunction': 2, 'DFA': 37, 'fault induction': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 6}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 81': 3, 'FIPS 180-2': 2, 'FIPS PUB 197': 3, 'FIPS PUB 46-3': 2, 'FIPS PUB 180-2': 1}, 'PKCS': {'PKCS #1': 6}, 'BSI': {'AIS31': 3, 'AIS20': 2}, 'ISO': {'ISO/IEC 15946-2': 1, 'ISO/IEC 15946-1': 1}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2, 'CCMB-2005-08-004': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 3}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}]} values discarded.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2008-09-30', 'maintenance_title': 'NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0440_ma1a.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/0440_ma1b.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}]}.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 664239, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 77, '/CreationDate': "D:20071107141301+01'00'", '/Security#20status': 'PUBLIC INFORMATION', '/Specification#20status': 'Evaluation documentation', '/Template#20date': '1 October 2006', '/Subject': 'Common Criteria Evaluation of Crypto Library on SmartMX', '/Author': 'Andreas Kühn', '/Template#20version': '2.8.1', '/Creator': 'Acrobat PDFMaker 7.0.7 for Word', '/Keywords': 'Crypto Library, SmartMX, P5CD144, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA', '/TOE#20short': 'Crypto Library on SmartMX', '/TOE#20long': 'Secured Crypto Library on the P5CD144V0B', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/Modification#20date': '7 November 2007', '/Division': 'NXP Semiconductors', '/Revision': 'Rev. 1.1', '/Copyright#20date': '2007', '/docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an', '/philips_smx_cl_docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an', '/Alternative#20descriptive#20title': 'Security Target Lite', '/Descriptive#20title': 'Security Target Lite', '/Chip#20type': 'P5CD144V0B', '/ModDate': "D:20080624155809+02'00'", '/Status': 'Accepted', '/Company': 'NXP Semiconductors', '/Chip#20family': 'SmartMX', '/SourceModified': 'D:20071107130934', '/relBibilioPath': '..\\Bibliography.doc', '/Title': 'Security Target Lite - Secured Crypto Library on the P5CD144V0B', '/CertificationID': 'BSI-DSZ-CC-0440', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cacr.math.uwaterloo.ca/hac/']}}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0440a.pdf', 'st_filename': '0440b.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0417-2008': 2}, '__update__': {'BSI-DSZ-CC-0440-2008': 36}}}}, 'cc_protection_profile_id': {'__update__': {'BSI': {'__insert__': {'BSI-PP-0002': 1}, '__delete__': ['BSI-PP-0002.2001']}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 5, 'EAL2': 3, 'EAL6': 3}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_LCD': 1}}, 'AVA': {'__update__': {'AVA_VLA.4': 5}}}}, 'cc_claims': {'__update__': {'R': {'R.O': 2}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP': 13}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 7}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 6}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDSA': {'__update__': {'ECDSA': 1}}}}, 'FF': {'__delete__': ['DSA']}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 3}}}}, 'crypto_engine': {'__update__': {'SmartMX': {'__update__': {'SmartMX': 12}}}}, 'standard_id': {'__insert__': {'FIPS': {'FIPS 180-1': 2}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'1.1, 07 November 2007, Secured Crypto Library on the P5CD144V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi': 1, 'Technical Report, 4.0, 16 May 2008, Secured Crypto Library on the P5CD144V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8': 1, 'AIS 36 for the Product Secured Crypto Library on the P5CD144V0B, 5.0, 16 May 2008, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL5': 30, 'EAL5+': 10, 'EAL4+': 3, 'EAL 5 augmented': 3, 'EAL5 augmented': 3}}}}, 'cc_sar': {'__insert__': {'ASE': {'ASE_REQ': 1}}, '__update__': {'ACM': {'__update__': {'ACM_CAP.4': 1}}, 'ADO': {'__update__': {'ADO_IGS.1': 1}}, 'ALC': {'__update__': {'ALC_LCD.2': 1}}, 'ATE': {'__update__': {'ATE_DPT.2': 1, 'ATE_IND.2': 1}}, 'AVA': {'__update__': {'AVA_MSU.3': 5, 'AVA_VLA.4': 7, 'AVA_SOF.1': 5}}}}, 'cc_sfr': {'__update__': {'FCS': {'__insert__': {'FCS_COP.1.1': 8, 'FCS_CKM.1.1': 2}, '__update__': {'FCS_CKM.1': 45, 'FCS_CKM.4': 18, 'FCS_CKM.2': 13, 'FCS_COP.1': 95}}, 'FDP': {'__insert__': {'FDP_ITT': 1, 'FDP_ITT.1.1': 1}, '__update__': {'FDP_ITT.1': 35, 'FDP_ACC.1': 17, 'FDP_ACF.1': 11, 'FDP_RIP': 2}}, 'FMT': {'__update__': {'FMT_SMR.1': 8, 'FMT_MSA.3': 14, 'FMT_MSA.1': 16}}, 'FPT': {'__insert__': {'FPT_ITT': 1, 'FPT_ITT.1.1': 1, 'FPT_AMT': 1, 'FPT_RVM': 1}, '__update__': {'FPT_FLS.1': 22, 'FPT_ITT.1': 43, 'FPT_TST.2': 36, 'FPT_TST': 13, 'FPT_AMT.1': 4, 'FPT_SEP.1': 8, 'FPT_TST.1': 13}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.RND': 14, 'O.MEM_ACCESS': 5, 'O.COPY': 6, 'O.ECC_DHKA': 2}}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP Semiconductors': 28, 'NXP': 96}}, 'Philips': {'__update__': {'Philips': 2}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 53}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 42}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CBC-MAC': 16}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__delete__': ['ECDSA']}, 'FF': {'__delete__': ['DSA']}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 2}}}, '__delete__': ['KA']}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 102, 'RND': 21}}}}, 'crypto_engine': {'__update__': {'SmartMX': {'__update__': {'SmartMX': 126}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'SPA': 27, 'DPA': 19, 'timing attacks': 9}}, 'FI': {'__update__': {'Malfunction': 12}}}}, 'tee_name': {}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0417-2008']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0417-2008', 'BSI-DSZ-CC-0410-2007']}}} data.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-410-2007']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-410-2007']}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 16.11.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_metadata property was updated, with the {'/Security status': 'PUBLIC INFORMATION', '/Specification status': 'Evaluation documentation', '/Template date': '1 October 2006', '/Template version': '2.8.1', '/TOE short': 'Crypto Library on SmartMX', '/TOE long': 'Secured Crypto Library on the P5CD144V0B', '/Modification date': '7 November 2007', '/Copyright date': '2007', '/Alternative descriptive title': 'Security Target Lite', '/Descriptive title': 'Security Target Lite', '/Chip type': 'P5CD144V0B', '/Chip family': 'SmartMX'} values inserted.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "8424207a5053802b",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "BSI-DSZ-CC-0440-2008",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_CCA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0411-2007",
          "BSI-DSZ-CC-0417-2008"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0417-2008",
          "BSI-DSZ-CC-0404-2007",
          "BSI-DSZ-CC-0411-2007",
          "BSI-DSZ-CC-0410-2007"
        ]
      }
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0411-2007"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0411-2007"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport",
        "maintenance_date": "2008-09-30",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/0440_ma1a.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/0440_ma1b.pdf",
        "maintenance_title": "NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.1"
      }
    ]
  },
  "manufacturer": "NXP Semiconductors",
  "manufacturer_web": "https://www.nxp.com/",
  "name": "NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2008-07-03",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "0440a.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {
        "cert_id": "BSI-DSZ-CC-0440-2008",
        "cert_item": "NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.0",
        "cert_lab": "BSI",
        "developer": "NXP Semiconductors Germany GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      },
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 13
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0411-2007": 4,
          "BSI-DSZ-CC-0417-2008": 2,
          "BSI-DSZ-CC-0440-2008": 36,
          "BSI-DSZ-CC-410-2007": 2
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 2
        },
        "R": {
          "R.O": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0002-2001": 2,
          "BSI-CC-PP-0002_2001": 1,
          "BSI-PP-0002": 1,
          "BSI-PP-0002-2001": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_AUT.1": 1,
          "ACM_CAP": 2,
          "ACM_CAP.4": 1,
          "ACM_SCP": 2,
          "ACM_SCP.3": 2
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 1,
          "ADO_IGS": 2,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_FSP.3": 1,
          "ADV_HLD": 2,
          "ADV_HLD.3": 1,
          "ADV_IMP": 2,
          "ADV_IMP.2": 1,
          "ADV_INT": 2,
          "ADV_INT.1": 1,
          "ADV_LLD": 2,
          "ADV_RCR": 2,
          "ADV_RCR.2": 1,
          "ADV_SPM": 2,
          "ADV_SPM.3": 1
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_USR": 2
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.2": 6,
          "ALC_FLR": 2,
          "ALC_LCD": 1,
          "ALC_LCD.2": 2,
          "ALC_TAT": 2,
          "ALC_TAT.2": 2
        },
        "APE": {
          "APE_DES": 1,
          "APE_ENV": 1,
          "APE_INT": 1,
          "APE_OBJ": 1,
          "APE_REQ": 1,
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_DES": 1,
          "ASE_ENV": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_PPC": 1,
          "ASE_REQ": 1,
          "ASE_SRE": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_DPT": 2,
          "ATE_DPT.2": 1,
          "ATE_FUN": 2,
          "ATE_IND": 2
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_CCA.1": 1,
          "AVA_MSU": 2,
          "AVA_MSU.3": 5,
          "AVA_SOF": 3,
          "AVA_VLA": 3,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 6,
          "EAL 5": 4,
          "EAL 5 augmented": 4,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 5,
          "EAL5": 6,
          "EAL5+": 1,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "1.1, 07 November 2007, Secured Crypto Library on the P5CD144V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi": 1,
          "AIS 36 for the Product Secured Crypto Library on the P5CD144V0B, 5.0, 16 May 2008, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items": 1,
          "Technical Report, 4.0, 16 May 2008, Secured Crypto Library on the P5CD144V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 12
        }
      },
      "crypto_library": {
        "Generic": {
          "Crypto Library 2.0": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-224": 5,
            "SHA-256": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1
        },
        "SCA": {
          "Side channel": 1,
          "physical probing": 1,
          "side channel": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 25": 3,
          "AIS 26": 3,
          "AIS 31": 3,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 35": 2,
          "AIS 36": 2,
          "AIS 38": 1
        },
        "FIPS": {
          "FIPS 180-1": 2
        },
        "ISO": {
          "ISO/IEC 15408:2005": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "Triple-DES": 2
          },
          "DES": {
            "DES": 6
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies AG": 1
        },
        "NXP": {
          "NXP": 13,
          "NXP Semiconductors": 26
        },
        "Philips": {
          "Philips": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20080711074302+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"NXP Smart Card Controller P5CD144V0Bwith IC deicated software:Secured Crypto Library Release 2.0, BSI-DSZ-CC-0440-2008, NXP Semiconductors Germany GmbH, Common Criteria, Zertifizierung\"",
      "/ModDate": "D:20080715141150+02\u002700\u0027",
      "/Producer": "StarOffice 8",
      "/Subject": "Common Criteria Zertifizierung",
      "/Title": "Zertifizierungsreport BSI-DSZ-CC-0440-2008",
      "pdf_file_size_bytes": 569027,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 34
    },
    "st_filename": "0440b.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 66
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 12
          }
        },
        "RSA": {
          "RSA-CRT": 3
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0411-2007": 2
        }
      },
      "cc_claims": {
        "O": {
          "O.AES": 6,
          "O.CONFIG": 2,
          "O.COPY": 6,
          "O.ECC": 7,
          "O.ECC_DHKA": 2,
          "O.ECC_DHKE": 3,
          "O.HW_AES": 3,
          "O.MEM_ACCESS": 5,
          "O.MF_FW": 4,
          "O.REUSE": 6,
          "O.RND": 14,
          "O.RSA": 6,
          "O.SFR_ACCESS": 4,
          "O.SHA": 7
        },
        "T": {
          "T.RND": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0002-2001": 9,
          "BSI-PP-0002-2001": 8
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_AUT.1": 2,
          "ACM_CAP": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP": 1,
          "ACM_SCP.3": 3
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_DEL.2": 2,
          "ADO_IGS": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.3": 3,
          "ADV_HLD.3": 2,
          "ADV_IMP.2": 4,
          "ADV_INT.1": 2,
          "ADV_LLD.1": 2,
          "ADV_RCR.2": 2,
          "ADV_SPM.1": 1,
          "ADV_SPM.3": 2
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 2,
          "AGD_USR": 1,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 6,
          "ALC_LCD": 1,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.2": 2
        },
        "ASE": {
          "ASE_REQ": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.2": 1,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA.1": 2,
          "AVA_MSU.3": 5,
          "AVA_SOF.1": 5,
          "AVA_VLA.4": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 3,
          "EAL 5 augmented": 3,
          "EAL4": 2,
          "EAL4 augmented": 1,
          "EAL4+": 3,
          "EAL5": 30,
          "EAL5 augmented": 3,
          "EAL5+": 10
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 4
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 45,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 13,
          "FCS_CKM.4": 18,
          "FCS_COP": 1,
          "FCS_COP.1": 95,
          "FCS_COP.1.1": 8,
          "FCS_RND": 6,
          "FCS_RND.1": 15,
          "FCS_RND.1.1": 1,
          "FCS_RND.2": 32,
          "FCS_RND.2.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 17,
          "FDP_ACF.1": 11,
          "FDP_IFC.1": 34,
          "FDP_ITC.1": 18,
          "FDP_ITT": 1,
          "FDP_ITT.1": 35,
          "FDP_ITT.1.1": 1,
          "FDP_RIP": 2,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 2,
          "FMT_LIM.2": 2,
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 16,
          "FMT_MSA.2": 20,
          "FMT_MSA.3": 14,
          "FMT_SMF.1": 5,
          "FMT_SMR.1": 8
        },
        "FPT": {
          "FPT_AMT": 1,
          "FPT_AMT.1": 4,
          "FPT_FLS.1": 22,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 1,
          "FPT_ITT.1": 43,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 6,
          "FPT_RND.1": 1,
          "FPT_RND.2": 1,
          "FPT_RVM": 1,
          "FPT_SEP.1": 8,
          "FPT_TST": 13,
          "FPT_TST.1": 13,
          "FPT_TST.2": 36,
          "FPT_TST.2.1": 2
        },
        "FRU": {
          "FRU_FLT.2": 15
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 23
        },
        "ECB": {
          "ECB": 15
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 126
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 10
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 14
          },
          "SHA2": {
            "SHA-224": 10,
            "SHA-256": 11
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 21,
          "RNG": 102
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 37,
          "Malfunction": 12,
          "fault induction": 1,
          "fault injection": 1,
          "malfunction": 2
        },
        "SCA": {
          "DPA": 19,
          "Leak-Inherent": 12,
          "Physical Probing": 2,
          "SPA": 27,
          "Timing attack": 1,
          "Timing attacks": 3,
          "side channel": 15,
          "side-channel": 7,
          "timing attacks": 9
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 2,
          "AIS31": 3
        },
        "CC": {
          "CCMB-2005-08-001": 2,
          "CCMB-2005-08-002": 2,
          "CCMB-2005-08-003": 2,
          "CCMB-2005-08-004": 3
        },
        "FIPS": {
          "FIPS 180-2": 2,
          "FIPS PUB 180-2": 1,
          "FIPS PUB 197": 3,
          "FIPS PUB 46-3": 2,
          "FIPS PUB 81": 3
        },
        "ISO": {
          "ISO/IEC 15946-1": 1,
          "ISO/IEC 15946-2": 1
        },
        "PKCS": {
          "PKCS #1": 6
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 53
          }
        },
        "DES": {
          "3DES": {
            "3DES": 17,
            "TDES": 1,
            "Triple-DES": 19
          },
          "DES": {
            "DEA": 1,
            "DES": 42
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 16
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 1
        },
        "NXP": {
          "NXP": 96,
          "NXP Semiconductors": 28
        },
        "Philips": {
          "Philips": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Alternative descriptive title": "Security Target Lite",
      "/Author": "Andreas K\u00fchn",
      "/CertificationID": "BSI-DSZ-CC-0440",
      "/Chip family": "SmartMX",
      "/Chip type": "P5CD144V0B",
      "/Company": "NXP Semiconductors",
      "/Copyright date": "2007",
      "/CreationDate": "D:20071107141301+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0.7 for Word",
      "/Descriptive title": "Security Target Lite",
      "/Division": "NXP Semiconductors",
      "/Keywords": "Crypto Library, SmartMX, P5CD144, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA",
      "/ModDate": "D:20080624155809+02\u002700\u0027",
      "/Modification date": "7 November 2007",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/Revision": "Rev. 1.1",
      "/Security status": "PUBLIC INFORMATION",
      "/SourceModified": "D:20071107130934",
      "/Specification status": "Evaluation documentation",
      "/Status": "Accepted",
      "/Subject": "Common Criteria Evaluation of Crypto Library on SmartMX",
      "/TOE long": "Secured Crypto Library on the P5CD144V0B",
      "/TOE short": "Crypto Library on SmartMX",
      "/Template date": "1 October 2006",
      "/Template version": "2.8.1",
      "/Title": "Security Target Lite - Secured Crypto Library on the P5CD144V0B",
      "/docpath": "I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an",
      "/philips_smx_cl_docpath": "I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an",
      "/relBibilioPath": "..\\Bibliography.doc",
      "pdf_file_size_bytes": 664239,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cacr.math.uwaterloo.ca/hac/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 77
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0440a.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "ALC_DVS.2",
      "AVA_VLA.4",
      "AVA_MSU.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0440b.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "16c4bb0e1301bfc73b8ae0c08343cde53f79af838e9271aa8d8a0bf592e9d871",
    "report_txt_hash": "11be0ce2f917f515447f15d0c8f9ddc13d306d96f748cb60f58b92520cfdd7b3",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "96260b763de45562884f6a97a8a597321748abdc8b03a69baba451afbaacf2b7",
    "st_txt_hash": "715b48476bc3e63f08767b6b594c008daaa34dbb4135fec6b1d038dff52634d5"
  },
  "status": "archived"
}