NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0

CSV information ?

Status archived
Valid from 03.07.2008
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer NXP Semiconductors
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_MSU.3, EAL5+, AVA_VLA.4, ALC_DVS.2
Maintenance updates NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.1 (30.09.2008) Certification report Security target

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0440-2008

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES
Asymmetric Algorithms
ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-224
Schemes
Key Exchange
Randomness
RNG
Engines
SmartMX
Libraries
Crypto Library 2.0

Vendor
NXP, NXP Semiconductors, Infineon Technologies AG, Philips

Security level
EAL 5, EAL 4, EAL4, EAL 1, EAL 7, EAL5+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 5 augmented
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ACM_SCP.3, ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_RCR.2, ADV_SPM.3, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_DPT.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_CCA.1, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSS
Protection profiles
BSI-CC-PP-0002-2001, BSI-CC-PP-0002_2001, BSI-PP-0002-2001, BSI-PP-0002
Certificates
BSI-DSZ-CC-0440-2008, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-410-2007, BSI-DSZ-CC-0411-2007-MA-01
Evaluation facilities
Brightsight
Certification process
1.1, 07 November 2007, Secured Crypto Library on the P5CD144V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi, Technical Report, 4.0, 16 May 2008, Secured Crypto Library on the P5CD144V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8, AIS 36 for the Product Secured Crypto Library on the P5CD144V0B, 5.0, 16 May 2008, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items

Side-channel analysis
physical probing, Side channel, side channel, fault injection, JIL
Certification process
1.1, 07 November 2007, Secured Crypto Library on the P5CD144V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi, Technical Report, 4.0, 16 May 2008, Secured Crypto Library on the P5CD144V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8, AIS 36 for the Product Secured Crypto Library on the P5CD144V0B, 5.0, 16 May 2008, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items

Standards
FIPS 180-1, AIS 34, AIS 20, AIS 25, AIS 26, AIS 31, AIS 35, AIS 36, AIS 32, AIS 38, ISO/IEC 15408:2005
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title: Zertifizierungsreport BSI-DSZ-CC-0440-2008
Subject: Common Criteria Zertifizierung
Keywords: "NXP Smart Card Controller P5CD144V0Bwith IC deicated software:Secured Crypto Library Release 2.0, BSI-DSZ-CC-0440-2008, NXP Semiconductors Germany GmbH, Common Criteria, Zertifizierung"
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20080711074302+02'00'
Modification date: D:20080715141150+02'00'
Pages: 34
Creator: Writer
Producer: StarOffice 8

Frontpage

Certificate ID: BSI-DSZ-CC-0440-2008
Certified item: NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.0
Certification lab: BSI
Developer: NXP Semiconductors Germany GmbH

References

Outgoing
  • BSI-DSZ-CC-0417-2008 - NXP Smart Card Controller P5CD080V0B with Dedicated software: Secured Crypto Library Release 2.0
  • BSI-DSZ-CC-0411-2007 - NXP Secure Smart Card Controller P5CD144V0B, P5CN144V0B and P5CC144V0B each with specific IC Dedicated Software

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DEA, DES, Triple-DES, 3DES, TDES, CBC-MAC
Asymmetric Algorithms
RSA-CRT, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256
Schemes
MAC, Key Exchange
Randomness
TRNG, RND, RNG
Engines
SmartMX
Block cipher modes
ECB, CBC

Vendor
NXP Semiconductors, NXP, Infineon Technologies, Philips

Security level
EAL5, EAL 5, EAL5+, EAL4+, EAL4, EAL5 augmented, EAL 5 augmented, EAL4 augmented
Claims
O.RND, O.HW_AES, O.MF_FW, O.MEM_ACCESS, O.SFR_ACCESS, O.CONFIG, O.AES, O.RSA, O.ECC, O.ECC_DHKE, O.SHA, O.COPY, O.REUSE, O.ECC_DHKA, T.RND
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_SPM.1, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_SOF.1, AVA_CCA.1, ASE_REQ
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RND.1, FCS_RND.2, FCS_COP.1, FCS_CKM.1, FCS_RND, FCS_COP.1.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2, FCS_RND.2.1, FCS_CKM, FCS_COP, FCS_RND.1.1, FDP_IFC.1, FDP_ITT.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ITC.1, FDP_RIP, FDP_RIP.1.1, FDP_ITT, FDP_ITT.1.1, FDP_SDI.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_MSA.2, FMT_SMR.1, FMT_MOF.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FPT_FLS.1.1, FPT_TST.2, FPT_TST, FPT_TST.2.1, FPT_AMT.1, FPT_ITT, FPT_ITT.1.1, FPT_TST.1, FPT_AMT, FPT_RVM, FPT_RND.1, FPT_RND.2, FRU_FLT.2
Protection profiles
BSI-PP- 0002-2001, BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0440, BSI-DSZ-CC-0411-2007, BSI-DSZ-CC-0411, BSI-DSZ-CC-0411-

Side-channel analysis
Leak-Inherent, Physical Probing, side-channel, side channel, SPA, DPA, timing attacks, Timing attacks, Timing attack, Malfunction, malfunction, DFA, fault induction, fault injection

Standards
FIPS PUB 81, FIPS 180-2, FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 180-2, PKCS #1, AIS31, AIS20, ISO/IEC 15946-2, ISO/IEC 15946-1, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title: Security Target Lite - Secured Crypto Library on the P5CD144V0B
Subject: Common Criteria Evaluation of Crypto Library on SmartMX
Keywords: Crypto Library, SmartMX, P5CD144, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA
Author: Andreas Kühn
Creation date: D:20071107141301+01'00'
Modification date: D:20080624155809+02'00'
Pages: 77
Creator: Acrobat PDFMaker 7.0.7 for Word
Producer: Acrobat Distiller 7.0.5 (Windows)

References

Outgoing
  • BSI-DSZ-CC-0411-2007 - NXP Secure Smart Card Controller P5CD144V0B, P5CN144V0B and P5CC144V0B each with specific IC Dedicated Software

Heuristics ?

Certificate ID: BSI-DSZ-CC-0440-2008

Extracted SARs

AVA_SOF.1, ADV_INT.1, ADV_SPM.3, AGD_ADM.1, ADV_IMP.2, ALC_LCD.2, AVA_VLA.4, ATE_DPT.2, ADV_RCR.2, ATE_FUN.1, ALC_DVS.2, AVA_MSU.3, ADV_FSP.3, ATE_COV.2, ATE_IND.2, ADV_HLD.3, AGD_USR.1, ALC_TAT.2, AVA_CCA.1, ADV_LLD.1

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '16c4bb0e1301bfc73b8ae0c08343cde53f79af838e9271aa8d8a0bf592e9d871', 'txt_hash': '11be0ce2f917f515447f15d0c8f9ddc13d306d96f748cb60f58b92520cfdd7b3'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '96260b763de45562884f6a97a8a597321748abdc8b03a69baba451afbaacf2b7', 'txt_hash': '715b48476bc3e63f08767b6b594c008daaa34dbb4135fec6b1d038dff52634d5'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0440-2008', 'cert_item': 'NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.0', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0411-2007-MA-01': 1}, '__update__': {'BSI-DSZ-CC-0440-2008': 18, 'BSI-DSZ-CC-0417-2008': 1, 'BSI-DSZ-CC-0411-2007': 2, 'BSI-DSZ-CC-410-2007': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0440': 1, 'BSI-DSZ-CC-0411': 1, 'BSI-DSZ-CC-0411-': 1}, '__update__': {'BSI-DSZ-CC-0411-2007': 1}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0440-2008': 36, 'BSI-DSZ-CC-0417-2008': 2, 'BSI-DSZ-CC-0411-2007': 4, 'BSI-DSZ-CC-410-2007': 2}, '__delete__': ['BSI-DSZ-CC-0411-2007-MA-01']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0411-2007': 2}, '__delete__': ['BSI-DSZ-CC-0440', 'BSI-DSZ-CC-0411', 'BSI-DSZ-CC-0411-']}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'1 1 2': 5, '1 2 3': 5, '4 5 5': 1, '1 1 1': 11, '3 3 4': 1, '1 2 2': 6, '2 2 3': 2, '1 3 3': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0411-2007-MA-01': 1}, '__update__': {'BSI-DSZ-CC-0440-2008': 18, 'BSI-DSZ-CC-0417-2008': 1, 'BSI-DSZ-CC-0411-2007': 2, 'BSI-DSZ-CC-410-2007': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0440': 1, 'BSI-DSZ-CC-0411': 1, 'BSI-DSZ-CC-0411-': 1}, '__update__': {'BSI-DSZ-CC-0411-2007': 1}}}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2008-09-30', 'maintenance_title': 'NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0440_ma1a.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/0440_ma1b.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 96260b763de45562884f6a97a8a597321748abdc8b03a69baba451afbaacf2b7.
    • The st_txt_hash property was set to 715b48476bc3e63f08767b6b594c008daaa34dbb4135fec6b1d038dff52634d5.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 664239, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 77, '/CreationDate': "D:20071107141301+01'00'", '/Security status': 'PUBLIC INFORMATION', '/Specification status': 'Evaluation documentation', '/Template date': '1 October 2006', '/Subject': 'Common Criteria Evaluation of Crypto Library on SmartMX', '/Author': 'Andreas Kühn', '/Template version': '2.8.1', '/Creator': 'Acrobat PDFMaker 7.0.7 for Word', '/Keywords': 'Crypto Library, SmartMX, P5CD144, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA', '/TOE short': 'Crypto Library on SmartMX', '/TOE long': 'Secured Crypto Library on the P5CD144V0B', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/Modification date': '7 November 2007', '/Division': 'NXP Semiconductors', '/Revision': 'Rev. 1.1', '/Copyright date': '2007', '/docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an', '/philips_smx_cl_docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an', '/Alternative descriptive title': 'Security Target Lite', '/Descriptive title': 'Security Target Lite', '/Chip type': 'P5CD144V0B', '/ModDate': "D:20080624155809+02'00'", '/Status': 'Accepted', '/Company': 'NXP Semiconductors', '/Chip family': 'SmartMX', '/SourceModified': 'D:20071107130934', '/relBibilioPath': '..\\Bibliography.doc', '/Title': 'Security Target Lite - Secured Crypto Library on the P5CD144V0B', '/CertificationID': 'BSI-DSZ-CC-0440', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cacr.math.uwaterloo.ca/hac/']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0411-2007': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP- 0002-2001': 9, 'BSI-PP-0002-2001': 8}}, 'cc_security_level': {'EAL': {'EAL5': 30, 'EAL 5': 3, 'EAL5+': 10, 'EAL4+': 3, 'EAL4': 2, 'EAL5 augmented': 3, 'EAL 5 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 1, 'ACM_SCP.3': 3, 'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 1, 'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_SPM.1': 1, 'ADV_FSP.3': 3, 'ADV_HLD.3': 2, 'ADV_IMP.2': 4, 'ADV_INT.1': 2, 'ADV_LLD.1': 2, 'ADV_RCR.2': 2, 'ADV_SPM.3': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.2': 1, 'ALC_TAT.2': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 1, 'ATE_FUN.1': 2, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 7, 'AVA_SOF.1': 5, 'AVA_CCA.1': 2}, 'ASE': {'ASE_REQ': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.1': 15, 'FCS_RND.2': 32, 'FCS_COP.1': 95, 'FCS_CKM.1': 45, 'FCS_RND': 6, 'FCS_COP.1.1': 8, 'FCS_CKM.4': 18, 'FCS_CKM.1.1': 2, 'FCS_CKM.2': 13, 'FCS_RND.2.1': 2, 'FCS_CKM': 2, 'FCS_COP': 1, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_IFC.1': 34, 'FDP_ITT.1': 35, 'FDP_ACC.1': 17, 'FDP_ACF.1': 11, 'FDP_RIP.1': 9, 'FDP_ITC.1': 18, 'FDP_RIP': 2, 'FDP_RIP.1.1': 1, 'FDP_ITT': 1, 'FDP_ITT.1.1': 1, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 2, 'FMT_LIM.2': 2, 'FMT_MSA.3': 14, 'FMT_MSA.1': 16, 'FMT_SMF.1': 5, 'FMT_MSA.2': 20, 'FMT_SMR.1': 8, 'FMT_MOF.1': 1}, 'FPT': {'FPT_FLS.1': 22, 'FPT_ITT.1': 43, 'FPT_PHP.3': 6, 'FPT_SEP.1': 8, 'FPT_FLS.1.1': 1, 'FPT_TST.2': 36, 'FPT_TST': 13, 'FPT_TST.2.1': 2, 'FPT_AMT.1': 4, 'FPT_ITT': 1, 'FPT_ITT.1.1': 1, 'FPT_TST.1': 13, 'FPT_AMT': 1, 'FPT_RVM': 1, 'FPT_RND.1': 1, 'FPT_RND.2': 1}, 'FRU': {'FRU_FLT.2': 15}}, 'cc_claims': {'O': {'O.RND': 14, 'O.HW_AES': 3, 'O.MF_FW': 4, 'O.MEM_ACCESS': 5, 'O.SFR_ACCESS': 4, 'O.CONFIG': 2, 'O.AES': 6, 'O.RSA': 6, 'O.ECC': 7, 'O.ECC_DHKE': 3, 'O.SHA': 7, 'O.COPY': 6, 'O.REUSE': 6, 'O.ECC_DHKA': 2}, 'T': {'T.RND': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 28, 'NXP': 96}, 'Infineon': {'Infineon Technologies': 1}, 'Philips': {'Philips': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 53}}, 'DES': {'DES': {'DEA': 1, 'DES': 42}, '3DES': {'Triple-DES': 19, '3DES': 17, 'TDES': 1}}, 'constructions': {'MAC': {'CBC-MAC': 16}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 3}, 'ECC': {'ECC': {'ECC': 66}}, 'FF': {'DH': {'Diffie-Hellman': 12}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 14}, 'SHA2': {'SHA-224': 10, 'SHA-256': 11}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key Exchange': 10}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 21, 'RNG': 102}}, 'cipher_mode': {'ECB': {'ECB': 15}, 'CBC': {'CBC': 23}}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 126}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 12, 'Physical Probing': 2, 'side-channel': 7, 'side channel': 15, 'SPA': 27, 'DPA': 19, 'timing attacks': 9, 'Timing attacks': 3, 'Timing attack': 1}, 'FI': {'Malfunction': 12, 'malfunction': 2, 'DFA': 37, 'fault induction': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 81': 3, 'FIPS 180-2': 2, 'FIPS PUB 197': 3, 'FIPS PUB 46-3': 2, 'FIPS PUB 180-2': 1}, 'PKCS': {'PKCS #1': 6}, 'BSI': {'AIS31': 3, 'AIS20': 2}, 'ISO': {'ISO/IEC 15946-2': 1, 'ISO/IEC 15946-1': 1}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2, 'CCMB-2005-08-004': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 0440b.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0411-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0411-2007']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The report_download_ok property was set to True.
    • The st_convert_ok property was set to False.
    • The report_convert_ok property was set to True.
    • The st_extract_ok property was set to False.
    • The report_extract_ok property was set to True.
    • The errors property was updated.
    • The st_pdf_hash property was set to None.
    • The report_pdf_hash property was set to 16c4bb0e1301bfc73b8ae0c08343cde53f79af838e9271aa8d8a0bf592e9d871.
    • The st_txt_hash property was set to None.
    • The report_txt_hash property was set to 11be0ce2f917f515447f15d0c8f9ddc13d306d96f748cb60f58b92520cfdd7b3.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 569027, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 34, '/CreationDate': "D:20080711074302+02'00'", '/Subject': 'Common Criteria Zertifizierung', '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Creator': 'Writer', '/Keywords': '"NXP Smart Card Controller P5CD144V0Bwith IC deicated software:Secured Crypto Library Release 2.0, BSI-DSZ-CC-0440-2008, NXP Semiconductors Germany GmbH, Common Criteria, Zertifizierung"', '/Producer': 'StarOffice 8', '/ModDate': "D:20080715141150+02'00'", '/Title': 'Zertifizierungsreport BSI-DSZ-CC-0440-2008', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.bsi.bund.de/']}}.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0440-2008', 'cert_item': 'NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.0', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI'}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0440-2008': 36, 'BSI-DSZ-CC-0417-2008': 2, 'BSI-DSZ-CC-0411-2007': 4, 'BSI-DSZ-CC-410-2007': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0002-2001': 2, 'BSI-CC-PP-0002_2001': 1, 'BSI-PP-0002-2001': 1, 'BSI-PP-0002': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 4, 'EAL 4': 6, 'EAL4': 5, 'EAL 1': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL1': 5, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL 5 augmented': 4}}, 'cc_sar': {'ACM': {'ACM_SCP.3': 2, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2, 'ACM_AUT.1': 1, 'ACM_CAP.4': 1}, 'ADO': {'ADO_DEL': 2, 'ADO_IGS': 2, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.3': 1, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.2': 2, 'ALC_TAT.2': 2, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2}, 'ATE': {'ATE_DPT.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_CCA.1': 1, 'AVA_VLA.4': 5, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA': 3, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'APE': {'APE_DES': 1, 'APE_ENV': 1, 'APE_INT': 1, 'APE_OBJ': 1, 'APE_REQ': 1, 'APE_SRE': 1}, 'ASE': {'ASE_DES': 1, 'ASE_ENV': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_PPC': 1, 'ASE_REQ': 1, 'ASE_SRE': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 2}, 'R': {'R.O': 2}}, 'vendor': {'NXP': {'NXP': 13, 'NXP Semiconductors': 26}, 'Infineon': {'Infineon Technologies AG': 1}, 'Philips': {'Philips': 1}}, 'eval_facility': {'BrightSight': {'Brightsight': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}, 'DES': {'DES': {'DES': 6}, '3DES': {'Triple-DES': 2, '3DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 13}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5}, 'SHA2': {'SHA-256': 5, 'SHA-224': 5}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 12}}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library 2.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'Side channel': 1, 'side channel': 1}, 'FI': {'fault injection': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-1': 2}, 'BSI': {'AIS 34': 3, 'AIS 20': 2, 'AIS 25': 3, 'AIS 26': 3, 'AIS 31': 3, 'AIS 35': 2, 'AIS 36': 2, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408:2005': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'1.1, 07 November 2007, Secured Crypto Library on the P5CD144V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi': 1, 'Technical Report, 4.0, 16 May 2008, Secured Crypto Library on the P5CD144V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8': 1, 'AIS 36 for the Product Secured Crypto Library on the P5CD144V0B, 5.0, 16 May 2008, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items': 1}}}.
    • The st_keywords property was set to None.
    • The report_filename property was set to 0440a.pdf.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0440-2008.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0411-2007', 'BSI-DSZ-CC-0417-2008']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0417-2008', 'BSI-DSZ-CC-0410-2007', 'BSI-DSZ-CC-0411-2007', 'BSI-DSZ-CC-0404-2007']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]} values discarded.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0440a.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0440b.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0440a.pdf, code: nok'].
    • The report_pdf_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 96260b763de45562884f6a97a8a597321748abdc8b03a69baba451afbaacf2b7.
    • The st_txt_hash property was set to 715b48476bc3e63f08767b6b594c008daaa34dbb4135fec6b1d038dff52634d5.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 664239, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 77, '/CreationDate': "D:20071107141301+01'00'", '/Security status': 'PUBLIC INFORMATION', '/Specification status': 'Evaluation documentation', '/Template date': '1 October 2006', '/Subject': 'Common Criteria Evaluation of Crypto Library on SmartMX', '/Author': 'Andreas Kühn', '/Template version': '2.8.1', '/Creator': 'Acrobat PDFMaker 7.0.7 for Word', '/Keywords': 'Crypto Library, SmartMX, P5CD144, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA', '/TOE short': 'Crypto Library on SmartMX', '/TOE long': 'Secured Crypto Library on the P5CD144V0B', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/Modification date': '7 November 2007', '/Division': 'NXP Semiconductors', '/Revision': 'Rev. 1.1', '/Copyright date': '2007', '/docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an', '/philips_smx_cl_docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an', '/Alternative descriptive title': 'Security Target Lite', '/Descriptive title': 'Security Target Lite', '/Chip type': 'P5CD144V0B', '/ModDate': "D:20080624155809+02'00'", '/Status': 'Accepted', '/Company': 'NXP Semiconductors', '/Chip family': 'SmartMX', '/SourceModified': 'D:20071107130934', '/relBibilioPath': '..\\Bibliography.doc', '/Title': 'Security Target Lite - Secured Crypto Library on the P5CD144V0B', '/CertificationID': 'BSI-DSZ-CC-0440', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cacr.math.uwaterloo.ca/hac/']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0411-2007': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP- 0002-2001': 9, 'BSI-PP-0002-2001': 8}}, 'cc_security_level': {'EAL': {'EAL5': 30, 'EAL 5': 3, 'EAL5+': 10, 'EAL4+': 3, 'EAL4': 2, 'EAL5 augmented': 3, 'EAL 5 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 1, 'ACM_SCP.3': 3, 'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 1, 'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_SPM.1': 1, 'ADV_FSP.3': 3, 'ADV_HLD.3': 2, 'ADV_IMP.2': 4, 'ADV_INT.1': 2, 'ADV_LLD.1': 2, 'ADV_RCR.2': 2, 'ADV_SPM.3': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.2': 1, 'ALC_TAT.2': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 1, 'ATE_FUN.1': 2, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 7, 'AVA_SOF.1': 5, 'AVA_CCA.1': 2}, 'ASE': {'ASE_REQ': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.1': 15, 'FCS_RND.2': 32, 'FCS_COP.1': 95, 'FCS_CKM.1': 45, 'FCS_RND': 6, 'FCS_COP.1.1': 8, 'FCS_CKM.4': 18, 'FCS_CKM.1.1': 2, 'FCS_CKM.2': 13, 'FCS_RND.2.1': 2, 'FCS_CKM': 2, 'FCS_COP': 1, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_IFC.1': 34, 'FDP_ITT.1': 35, 'FDP_ACC.1': 17, 'FDP_ACF.1': 11, 'FDP_RIP.1': 9, 'FDP_ITC.1': 18, 'FDP_RIP': 2, 'FDP_RIP.1.1': 1, 'FDP_ITT': 1, 'FDP_ITT.1.1': 1, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 2, 'FMT_LIM.2': 2, 'FMT_MSA.3': 14, 'FMT_MSA.1': 16, 'FMT_SMF.1': 5, 'FMT_MSA.2': 20, 'FMT_SMR.1': 8, 'FMT_MOF.1': 1}, 'FPT': {'FPT_FLS.1': 22, 'FPT_ITT.1': 43, 'FPT_PHP.3': 6, 'FPT_SEP.1': 8, 'FPT_FLS.1.1': 1, 'FPT_TST.2': 36, 'FPT_TST': 13, 'FPT_TST.2.1': 2, 'FPT_AMT.1': 4, 'FPT_ITT': 1, 'FPT_ITT.1.1': 1, 'FPT_TST.1': 13, 'FPT_AMT': 1, 'FPT_RVM': 1, 'FPT_RND.1': 1, 'FPT_RND.2': 1}, 'FRU': {'FRU_FLT.2': 15}}, 'cc_claims': {'O': {'O.RND': 14, 'O.HW_AES': 3, 'O.MF_FW': 4, 'O.MEM_ACCESS': 5, 'O.SFR_ACCESS': 4, 'O.CONFIG': 2, 'O.AES': 6, 'O.RSA': 6, 'O.ECC': 7, 'O.ECC_DHKE': 3, 'O.SHA': 7, 'O.COPY': 6, 'O.REUSE': 6, 'O.ECC_DHKA': 2}, 'T': {'T.RND': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 28, 'NXP': 96}, 'Infineon': {'Infineon Technologies': 1}, 'Philips': {'Philips': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 53}}, 'DES': {'DES': {'DEA': 1, 'DES': 42}, '3DES': {'Triple-DES': 19, '3DES': 17, 'TDES': 1}}, 'constructions': {'MAC': {'CBC-MAC': 16}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 3}, 'ECC': {'ECC': {'ECC': 66}}, 'FF': {'DH': {'Diffie-Hellman': 12}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 14}, 'SHA2': {'SHA-224': 10, 'SHA-256': 11}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key Exchange': 10}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 21, 'RNG': 102}}, 'cipher_mode': {'ECB': {'ECB': 15}, 'CBC': {'CBC': 23}}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 126}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 12, 'Physical Probing': 2, 'side-channel': 7, 'side channel': 15, 'SPA': 27, 'DPA': 19, 'timing attacks': 9, 'Timing attacks': 3, 'Timing attack': 1}, 'FI': {'Malfunction': 12, 'malfunction': 2, 'DFA': 37, 'fault induction': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 81': 3, 'FIPS 180-2': 2, 'FIPS PUB 197': 3, 'FIPS PUB 46-3': 2, 'FIPS PUB 180-2': 1}, 'PKCS': {'PKCS #1': 6}, 'BSI': {'AIS31': 3, 'AIS20': 2}, 'ISO': {'ISO/IEC 15946-2': 1, 'ISO/IEC 15946-1': 1}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2, 'CCMB-2005-08-004': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 0440b.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0411-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0411-2007']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]} values added.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0440b.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0410-2007']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0410-2007']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0404-2007']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0404-2007']}}} data.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0440a.pdf, code: nok'].
  • 16.11.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_metadata property was updated, with the {'/Security status': 'PUBLIC INFORMATION', '/Specification status': 'Evaluation documentation', '/Template date': '1 October 2006', '/Template version': '2.8.1', '/TOE short': 'Crypto Library on SmartMX', '/TOE long': 'Secured Crypto Library on the P5CD144V0B', '/Modification date': '7 November 2007', '/Copyright date': '2007', '/Alternative descriptive title': 'Security Target Lite', '/Descriptive title': 'Security Target Lite', '/Chip type': 'P5CD144V0B', '/Chip family': 'SmartMX'} values inserted.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-410-2007']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-410-2007']}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0440a.pdf', 'st_filename': '0440b.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0417-2008': 2}, '__update__': {'BSI-DSZ-CC-0440-2008': 36}}}}, 'cc_protection_profile_id': {'__update__': {'BSI': {'__insert__': {'BSI-PP-0002': 1}, '__delete__': ['BSI-PP-0002.2001']}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 5, 'EAL2': 3, 'EAL6': 3}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_LCD': 1}}, 'AVA': {'__update__': {'AVA_VLA.4': 5}}}}, 'cc_claims': {'__update__': {'R': {'R.O': 2}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP': 13}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 7}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 6}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDSA': {'__update__': {'ECDSA': 1}}}}, 'FF': {'__delete__': ['DSA']}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 3}}}}, 'crypto_engine': {'__update__': {'SmartMX': {'__update__': {'SmartMX': 12}}}}, 'standard_id': {'__insert__': {'FIPS': {'FIPS 180-1': 2}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'1.1, 07 November 2007, Secured Crypto Library on the P5CD144V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi': 1, 'Technical Report, 4.0, 16 May 2008, Secured Crypto Library on the P5CD144V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8': 1, 'AIS 36 for the Product Secured Crypto Library on the P5CD144V0B, 5.0, 16 May 2008, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL5': 30, 'EAL5+': 10, 'EAL4+': 3, 'EAL 5 augmented': 3, 'EAL5 augmented': 3}}}}, 'cc_sar': {'__insert__': {'ASE': {'ASE_REQ': 1}}, '__update__': {'ACM': {'__update__': {'ACM_CAP.4': 1}}, 'ADO': {'__update__': {'ADO_IGS.1': 1}}, 'ALC': {'__update__': {'ALC_LCD.2': 1}}, 'ATE': {'__update__': {'ATE_DPT.2': 1, 'ATE_IND.2': 1}}, 'AVA': {'__update__': {'AVA_MSU.3': 5, 'AVA_VLA.4': 7, 'AVA_SOF.1': 5}}}}, 'cc_sfr': {'__update__': {'FCS': {'__insert__': {'FCS_COP.1.1': 8, 'FCS_CKM.1.1': 2}, '__update__': {'FCS_CKM.1': 45, 'FCS_CKM.4': 18, 'FCS_CKM.2': 13, 'FCS_COP.1': 95}}, 'FDP': {'__insert__': {'FDP_ITT': 1, 'FDP_ITT.1.1': 1}, '__update__': {'FDP_ITT.1': 35, 'FDP_ACC.1': 17, 'FDP_ACF.1': 11, 'FDP_RIP': 2}}, 'FMT': {'__update__': {'FMT_SMR.1': 8, 'FMT_MSA.3': 14, 'FMT_MSA.1': 16}}, 'FPT': {'__insert__': {'FPT_ITT': 1, 'FPT_ITT.1.1': 1, 'FPT_AMT': 1, 'FPT_RVM': 1}, '__update__': {'FPT_FLS.1': 22, 'FPT_ITT.1': 43, 'FPT_TST.2': 36, 'FPT_TST': 13, 'FPT_AMT.1': 4, 'FPT_SEP.1': 8, 'FPT_TST.1': 13}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.RND': 14, 'O.MEM_ACCESS': 5, 'O.COPY': 6, 'O.ECC_DHKA': 2}}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP Semiconductors': 28, 'NXP': 96}}, 'Philips': {'__update__': {'Philips': 2}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 53}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 42}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CBC-MAC': 16}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__delete__': ['ECDSA']}, 'FF': {'__delete__': ['DSA']}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 2}}}, '__delete__': ['KA']}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 102, 'RND': 21}}}}, 'crypto_engine': {'__update__': {'SmartMX': {'__update__': {'SmartMX': 126}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'SPA': 27, 'DPA': 19, 'timing attacks': 9}}, 'FI': {'__update__': {'Malfunction': 12}}}}, 'tee_name': {}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0417-2008']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0417-2008', 'BSI-DSZ-CC-0410-2007']}}} data.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 664239, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 77, '/CreationDate': "D:20071107141301+01'00'", '/Security#20status': 'PUBLIC INFORMATION', '/Specification#20status': 'Evaluation documentation', '/Template#20date': '1 October 2006', '/Subject': 'Common Criteria Evaluation of Crypto Library on SmartMX', '/Author': 'Andreas Kühn', '/Template#20version': '2.8.1', '/Creator': 'Acrobat PDFMaker 7.0.7 for Word', '/Keywords': 'Crypto Library, SmartMX, P5CD144, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA', '/TOE#20short': 'Crypto Library on SmartMX', '/TOE#20long': 'Secured Crypto Library on the P5CD144V0B', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/Modification#20date': '7 November 2007', '/Division': 'NXP Semiconductors', '/Revision': 'Rev. 1.1', '/Copyright#20date': '2007', '/docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an', '/philips_smx_cl_docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an', '/Alternative#20descriptive#20title': 'Security Target Lite', '/Descriptive#20title': 'Security Target Lite', '/Chip#20type': 'P5CD144V0B', '/ModDate': "D:20080624155809+02'00'", '/Status': 'Accepted', '/Company': 'NXP Semiconductors', '/Chip#20family': 'SmartMX', '/SourceModified': 'D:20071107130934', '/relBibilioPath': '..\\Bibliography.doc', '/Title': 'Security Target Lite - Secured Crypto Library on the P5CD144V0B', '/CertificationID': 'BSI-DSZ-CC-0440', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.cacr.math.uwaterloo.ca/hac/']}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2008-09-30', 'maintenance_title': 'NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.1', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0440_ma1a.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/0440_ma1b.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/8424207a5053802b.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/8424207a5053802b.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.bsi.bund.de/']}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0440-2008': 68, 'BSI-DSZ-CC-0411-2007': 4, 'BSI-DSZ-CC-410-2007': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0002-2001': 2, 'BSI-CC-PP-0002_2001': 1, 'BSI-PP-0002-2001': 1, 'BSI-PP-0002.2001': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 4, 'EAL 4': 6, 'EAL4': 6, 'EAL 1': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL1': 5, 'EAL2': 4, 'EAL3': 4, 'EAL5': 6, 'EAL6': 4, 'EAL7': 4, 'EAL 5 augmented': 4}}, 'cc_sar': {'ACM': {'ACM_SCP.3': 2, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2, 'ACM_AUT.1': 1, 'ACM_CAP.4': 1}, 'ADO': {'ADO_DEL': 2, 'ADO_IGS': 2, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.3': 1, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.2': 2, 'ALC_TAT.2': 2, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 2, 'ALC_TAT': 2}, 'ATE': {'ATE_DPT.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 4, 'AVA_CCA.1': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA': 3, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'APE': {'APE_DES': 1, 'APE_ENV': 1, 'APE_INT': 1, 'APE_OBJ': 1, 'APE_REQ': 1, 'APE_SRE': 1}, 'ASE': {'ASE_DES': 1, 'ASE_ENV': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_PPC': 1, 'ASE_REQ': 1, 'ASE_SRE': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 2}, 'R': {'R.O.C': 2}}, 'vendor': {'NXP': {'NXP': 15, 'NXP Semiconductors': 26}, 'Infineon': {'Infineon Technologies AG': 1}, 'Philips': {'Philips': 1}}, 'eval_facility': {'BrightSight': {'Brightsight': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'DES': {'DES': 12}, '3DES': {'Triple-DES': 2, '3DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 4}, 'ECC': {'ECC': 13}}, 'FF': {'DH': {'Diffie-Hellman': 2}, 'DSA': {'DSA': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 5}, 'SHA2': {'SHA-256': 5, 'SHA-224': 5}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 11}}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library 2.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'Side channel': 1, 'side channel': 1}, 'FI': {'fault injection': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 3, 'AIS 20': 2, 'AIS 25': 3, 'AIS 26': 3, 'AIS 31': 3, 'AIS 35': 2, 'AIS 36': 2, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408:2005': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'n 1.1, 07 November 2007, Secured Crypto Library on the P5CD144V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi': 1, 'ation Technical Report, 4.0, 16 May 2008, Secured Crypto Library on the P5CD144V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8': 1, 'AIS 36 for the Product Secured Crypto Library on the P5CD144V0B, 5.0, 16 May 2008, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items ': 1, 'confidential document) [12] NXP Semiconductors User Guidance: Secured Crypto Library on the P5Cx02x/040/080/144 Family': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0411-2007': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP- 0002-2001': 9, 'BSI-PP-0002-2001': 8}}, 'cc_security_level': {'EAL': {'EAL5': 31, 'EAL 5': 3, 'EAL5+': 8, 'EAL4+': 2, 'EAL4': 2, 'EAL 5 augmented': 1, 'EAL5 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_SCP.3': 3, 'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_SPM.1': 1, 'ADV_FSP.3': 3, 'ADV_HLD.3': 2, 'ADV_IMP.2': 4, 'ADV_INT.1': 2, 'ADV_LLD.1': 2, 'ADV_RCR.2': 2, 'ADV_SPM.3': 2}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.2': 2, 'ALC_TAT.2': 2, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_MSU.3': 6, 'AVA_VLA.4': 5, 'AVA_SOF.1': 4, 'AVA_CCA.1': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.1': 15, 'FCS_RND.2': 32, 'FCS_RND': 6, 'FCS_CKM.1': 31, 'FCS_CKM.4': 20, 'FCS_CKM.2': 14, 'FCS_COP.1': 17, 'FCS_RND.2.1': 2, 'FCS_CKM': 2, 'FCS_COP': 1, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_IFC.1': 34, 'FDP_ITT.1': 27, 'FDP_RIP.1': 9, 'FDP_ITC.1': 18, 'FDP_RIP.1.1': 1, 'FDP_ACC.1': 6, 'FDP_SDI.1': 1, 'FDP_ACF.1': 2, 'FDP_RIP': 1}, 'FMT': {'FMT_LIM.1': 2, 'FMT_LIM.2': 2, 'FMT_SMF.1': 5, 'FMT_MSA.2': 20, 'FMT_SMR.1': 9, 'FMT_MSA.3': 3, 'FMT_MSA.1': 3, 'FMT_MOF.1': 1}, 'FPT': {'FPT_FLS.1': 27, 'FPT_ITT.1': 27, 'FPT_PHP.3': 6, 'FPT_FLS.1.1': 1, 'FPT_TST.2': 29, 'FPT_TST': 11, 'FPT_TST.2.1': 2, 'FPT_AMT.1': 5, 'FPT_SEP.1': 5, 'FPT_TST.1': 12, 'FPT_RND.1': 1, 'FPT_RND.2': 1}, 'FRU': {'FRU_FLT.2': 15}}, 'cc_claims': {'O': {'O.RND': 15, 'O.HW_AES': 3, 'O.MF_FW': 4, 'O.MEM_ACCESS': 6, 'O.SFR_ACCESS': 4, 'O.CONFIG': 2, 'O.AES': 6, 'O.RSA': 6, 'O.ECC': 7, 'O.ECC_DHKE': 3, 'O.SHA': 7, 'O.COPY': 7, 'O.REUSE': 6, 'O.ECC_DHKA': 3}, 'T': {'T.RND': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 103, 'NXP': 98}, 'Infineon': {'Infineon Technologies': 1}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 68}}, 'DES': {'DES': {'DEA': 1, 'DES': 107}, '3DES': {'3DES': 17, 'Triple-DES': 19, 'TDES': 1}}, 'constructions': {'MAC': {'CBC-MAC': 12}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 3}, 'ECC': {'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 66}}, 'FF': {'DH': {'Diffie-Hellman': 12}, 'DSA': {'DSA': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 14}, 'SHA2': {'SHA-224': 10, 'SHA-256': 11}}}, 'crypto_scheme': {'MAC': {'MAC': 14}, 'KEX': {'Key Exchange': 10}, 'KA': {'KA': 6}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 93, 'RND': 27}}, 'cipher_mode': {'ECB': {'ECB': 15}, 'CBC': {'CBC': 23}}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 116}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 12, 'Physical Probing': 2, 'side-channel': 7, 'side channel': 15, 'SPA': 28, 'DPA': 25, 'Timing attacks': 3, 'timing attacks': 8, 'Timing attack': 1}, 'FI': {'Malfunction': 13, 'malfunction': 2, 'DFA': 37, 'fault induction': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 6}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 81': 3, 'FIPS 180-2': 2, 'FIPS PUB 197': 3, 'FIPS PUB 46-3': 2, 'FIPS PUB 180-2': 1}, 'PKCS': {'PKCS #1': 6}, 'BSI': {'AIS31': 3, 'AIS20': 2}, 'ISO': {'ISO/IEC 15946-2': 1, 'ISO/IEC 15946-1': 1}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2, 'CCMB-2005-08-004': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 3}]} values discarded.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '16c4bb0e1301bfc73b8ae0c08343cde53f79af838e9271aa8d8a0bf592e9d871', 'st_pdf_hash': '96260b763de45562884f6a97a8a597321748abdc8b03a69baba451afbaacf2b7', 'report_txt_hash': '11be0ce2f917f515447f15d0c8f9ddc13d306d96f748cb60f58b92520cfdd7b3', 'st_txt_hash': '715b48476bc3e63f08767b6b594c008daaa34dbb4135fec6b1d038dff52634d5'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 8, 'DES': 11, '3DES': 1}, 'rules_asymmetric_crypto': {'ECDSA': 4, 'ECC': 13, 'Diffie-Hellman': 2, 'DSA': 4}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 5, 'SHA-256': 5, 'SHA-224': 5}, 'rules_crypto_schemes': {'Key Exchange': 2}, 'rules_randomness': {'RNG': 2}, 'rules_tee': {}, 'rules_side_channels': {'physical probing': 1, 'Side channel': 1, 'side channel': 1, 'fault injection': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 68, 'DEA': 1, 'DES': 89, '3DES': 17, 'TDES': 1}, 'rules_asymmetric_crypto': {'ECDSA': 5, 'ECC': 66, 'Diffie-Hellman': 12, 'DSA': 5}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 14, 'SHA-224': 10, 'SHA-256': 11}, 'rules_crypto_schemes': {'MAC': 14, 'Key Exchange': 10}, 'rules_randomness': {'TRNG': 1, 'RNG': 93, 'RND': 27}, 'rules_tee': {'SE': 6}, 'rules_side_channels': {'Malfunction': 13, 'malfunction': 2, 'Leak-Inherent': 12, 'Physical Probing': 2, 'side-channel': 7, 'side channel': 15, 'SPA': 27, 'DPA': 25, 'DFA': 37, 'fault induction': 1, 'fault injection': 1, 'Timing attacks': 3, 'timing attacks': 8, 'Timing attack': 1}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0411-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0411-2007']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0411-2007', 'BSI-DSZ-CC-410-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0404-2007', 'BSI-DSZ-CC-0411-2007', 'BSI-DSZ-CC-410-2007']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2.0']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "8424207a5053802b",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0440-2008",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_CCA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0417-2008",
          "BSI-DSZ-CC-0411-2007"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0410-2007",
          "BSI-DSZ-CC-0417-2008",
          "BSI-DSZ-CC-0404-2007",
          "BSI-DSZ-CC-0411-2007"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0411-2007"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0411-2007"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2008-09-30",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/0440_ma1a.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/0440_ma1b.pdf",
        "maintenance_title": "NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.1"
      }
    ]
  },
  "manufacturer": "NXP Semiconductors",
  "manufacturer_web": "https://www.nxp.com/",
  "name": "NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2008-07-03",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0440a.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0440-2008",
        "cert_item": "NXP Smart Card Controller P5CD144V0B with IC dedicated software: Secured Crypto Library Release 2.0",
        "cert_lab": "BSI",
        "developer": "NXP Semiconductors Germany GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 13
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0411-2007": 2,
          "BSI-DSZ-CC-0411-2007-MA-01": 1,
          "BSI-DSZ-CC-0417-2008": 1,
          "BSI-DSZ-CC-0440-2008": 18,
          "BSI-DSZ-CC-410-2007": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 2
        },
        "R": {
          "R.O": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0002-2001": 2,
          "BSI-CC-PP-0002_2001": 1,
          "BSI-PP-0002": 1,
          "BSI-PP-0002-2001": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_AUT.1": 1,
          "ACM_CAP": 2,
          "ACM_CAP.4": 1,
          "ACM_SCP": 2,
          "ACM_SCP.3": 2
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 1,
          "ADO_IGS": 2,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_FSP.3": 1,
          "ADV_HLD": 2,
          "ADV_HLD.3": 1,
          "ADV_IMP": 2,
          "ADV_IMP.2": 1,
          "ADV_INT": 2,
          "ADV_INT.1": 1,
          "ADV_LLD": 2,
          "ADV_RCR": 2,
          "ADV_RCR.2": 1,
          "ADV_SPM": 2,
          "ADV_SPM.3": 1
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_USR": 2
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.2": 6,
          "ALC_FLR": 2,
          "ALC_LCD": 1,
          "ALC_LCD.2": 2,
          "ALC_TAT": 2,
          "ALC_TAT.2": 2
        },
        "APE": {
          "APE_DES": 1,
          "APE_ENV": 1,
          "APE_INT": 1,
          "APE_OBJ": 1,
          "APE_REQ": 1,
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_DES": 1,
          "ASE_ENV": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_PPC": 1,
          "ASE_REQ": 1,
          "ASE_SRE": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_DPT": 2,
          "ATE_DPT.2": 1,
          "ATE_FUN": 2,
          "ATE_IND": 2
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_CCA.1": 1,
          "AVA_MSU": 2,
          "AVA_MSU.3": 5,
          "AVA_SOF": 3,
          "AVA_VLA": 3,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 6,
          "EAL 5": 4,
          "EAL 5 augmented": 4,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 5,
          "EAL5": 6,
          "EAL5+": 1,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "1.1, 07 November 2007, Secured Crypto Library on the P5CD144V0B, NXP Semiconductors Germany GmbH (confidential document) [4] Protection Profile BSI-PP-0002.2001, Version 1.0, July 2001, by Atmel Smart Card ICs, Hitachi": 1,
          "AIS 36 for the Product Secured Crypto Library on the P5CD144V0B, 5.0, 16 May 2008, Brightsight BV (confidential document) [11] Configuration list for the TOE, 1.4, 07 November 2007, List of Configuration Items": 1,
          "Technical Report, 4.0, 16 May 2008, Secured Crypto Library on the P5CD144V0B, Brightsight BV (confidential document) [7] Common Criteria for Information Technology Security Evaluation, Version 2.3, August 2005 [8": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 12
        }
      },
      "crypto_library": {
        "Generic": {
          "Crypto Library 2.0": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 5
          },
          "SHA2": {
            "SHA-224": 5,
            "SHA-256": 5
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1
        },
        "SCA": {
          "Side channel": 1,
          "physical probing": 1,
          "side channel": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 25": 3,
          "AIS 26": 3,
          "AIS 31": 3,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 35": 2,
          "AIS 36": 2,
          "AIS 38": 1
        },
        "FIPS": {
          "FIPS 180-1": 2
        },
        "ISO": {
          "ISO/IEC 15408:2005": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 7
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "Triple-DES": 2
          },
          "DES": {
            "DES": 6
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies AG": 1
        },
        "NXP": {
          "NXP": 13,
          "NXP Semiconductors": 26
        },
        "Philips": {
          "Philips": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20080711074302+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"NXP Smart Card Controller P5CD144V0Bwith IC deicated software:Secured Crypto Library Release 2.0, BSI-DSZ-CC-0440-2008, NXP Semiconductors Germany GmbH, Common Criteria, Zertifizierung\"",
      "/ModDate": "D:20080715141150+02\u002700\u0027",
      "/Producer": "StarOffice 8",
      "/Subject": "Common Criteria Zertifizierung",
      "/Title": "Zertifizierungsreport BSI-DSZ-CC-0440-2008",
      "pdf_file_size_bytes": 569027,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 34
    },
    "st_filename": "0440b.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 66
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 12
          }
        },
        "RSA": {
          "RSA-CRT": 3
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0411": 1,
          "BSI-DSZ-CC-0411-": 1,
          "BSI-DSZ-CC-0411-2007": 1,
          "BSI-DSZ-CC-0440": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.AES": 6,
          "O.CONFIG": 2,
          "O.COPY": 6,
          "O.ECC": 7,
          "O.ECC_DHKA": 2,
          "O.ECC_DHKE": 3,
          "O.HW_AES": 3,
          "O.MEM_ACCESS": 5,
          "O.MF_FW": 4,
          "O.REUSE": 6,
          "O.RND": 14,
          "O.RSA": 6,
          "O.SFR_ACCESS": 4,
          "O.SHA": 7
        },
        "T": {
          "T.RND": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0002-2001": 9,
          "BSI-PP-0002-2001": 8
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_AUT.1": 2,
          "ACM_CAP": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP": 1,
          "ACM_SCP.3": 3
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_DEL.2": 2,
          "ADO_IGS": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.3": 3,
          "ADV_HLD.3": 2,
          "ADV_IMP.2": 4,
          "ADV_INT.1": 2,
          "ADV_LLD.1": 2,
          "ADV_RCR.2": 2,
          "ADV_SPM.1": 1,
          "ADV_SPM.3": 2
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 2,
          "AGD_USR": 1,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 6,
          "ALC_LCD": 1,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.2": 2
        },
        "ASE": {
          "ASE_REQ": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.2": 1,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA.1": 2,
          "AVA_MSU.3": 5,
          "AVA_SOF.1": 5,
          "AVA_VLA.4": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 3,
          "EAL 5 augmented": 3,
          "EAL4": 2,
          "EAL4 augmented": 1,
          "EAL4+": 3,
          "EAL5": 30,
          "EAL5 augmented": 3,
          "EAL5+": 10
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 4
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 45,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 13,
          "FCS_CKM.4": 18,
          "FCS_COP": 1,
          "FCS_COP.1": 95,
          "FCS_COP.1.1": 8,
          "FCS_RND": 6,
          "FCS_RND.1": 15,
          "FCS_RND.1.1": 1,
          "FCS_RND.2": 32,
          "FCS_RND.2.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 17,
          "FDP_ACF.1": 11,
          "FDP_IFC.1": 34,
          "FDP_ITC.1": 18,
          "FDP_ITT": 1,
          "FDP_ITT.1": 35,
          "FDP_ITT.1.1": 1,
          "FDP_RIP": 2,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 2,
          "FMT_LIM.2": 2,
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 16,
          "FMT_MSA.2": 20,
          "FMT_MSA.3": 14,
          "FMT_SMF.1": 5,
          "FMT_SMR.1": 8
        },
        "FPT": {
          "FPT_AMT": 1,
          "FPT_AMT.1": 4,
          "FPT_FLS.1": 22,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 1,
          "FPT_ITT.1": 43,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 6,
          "FPT_RND.1": 1,
          "FPT_RND.2": 1,
          "FPT_RVM": 1,
          "FPT_SEP.1": 8,
          "FPT_TST": 13,
          "FPT_TST.1": 13,
          "FPT_TST.2": 36,
          "FPT_TST.2.1": 2
        },
        "FRU": {
          "FRU_FLT.2": 15
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 23
        },
        "ECB": {
          "ECB": 15
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 126
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 10
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 14
          },
          "SHA2": {
            "SHA-224": 10,
            "SHA-256": 11
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 21,
          "RNG": 102
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 37,
          "Malfunction": 12,
          "fault induction": 1,
          "fault injection": 1,
          "malfunction": 2
        },
        "SCA": {
          "DPA": 19,
          "Leak-Inherent": 12,
          "Physical Probing": 2,
          "SPA": 27,
          "Timing attack": 1,
          "Timing attacks": 3,
          "side channel": 15,
          "side-channel": 7,
          "timing attacks": 9
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 2,
          "AIS31": 3
        },
        "CC": {
          "CCMB-2005-08-001": 2,
          "CCMB-2005-08-002": 2,
          "CCMB-2005-08-003": 2,
          "CCMB-2005-08-004": 3
        },
        "FIPS": {
          "FIPS 180-2": 2,
          "FIPS PUB 180-2": 1,
          "FIPS PUB 197": 3,
          "FIPS PUB 46-3": 2,
          "FIPS PUB 81": 3
        },
        "ISO": {
          "ISO/IEC 15946-1": 1,
          "ISO/IEC 15946-2": 1
        },
        "PKCS": {
          "PKCS #1": 6
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 53
          }
        },
        "DES": {
          "3DES": {
            "3DES": 17,
            "TDES": 1,
            "Triple-DES": 19
          },
          "DES": {
            "DEA": 1,
            "DES": 42
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 16
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies": 1
        },
        "NXP": {
          "NXP": 96,
          "NXP Semiconductors": 28
        },
        "Philips": {
          "Philips": 2
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Alternative descriptive title": "Security Target Lite",
      "/Author": "Andreas K\u00fchn",
      "/CertificationID": "BSI-DSZ-CC-0440",
      "/Chip family": "SmartMX",
      "/Chip type": "P5CD144V0B",
      "/Company": "NXP Semiconductors",
      "/Copyright date": "2007",
      "/CreationDate": "D:20071107141301+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 7.0.7 for Word",
      "/Descriptive title": "Security Target Lite",
      "/Division": "NXP Semiconductors",
      "/Keywords": "Crypto Library, SmartMX, P5CD144, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA",
      "/ModDate": "D:20080624155809+02\u002700\u0027",
      "/Modification date": "7 November 2007",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/Revision": "Rev. 1.1",
      "/Security status": "PUBLIC INFORMATION",
      "/SourceModified": "D:20071107130934",
      "/Specification status": "Evaluation documentation",
      "/Status": "Accepted",
      "/Subject": "Common Criteria Evaluation of Crypto Library on SmartMX",
      "/TOE long": "Secured Crypto Library on the P5CD144V0B",
      "/TOE short": "Crypto Library on SmartMX",
      "/Template date": "1 October 2006",
      "/Template version": "2.8.1",
      "/Title": "Security Target Lite - Secured Crypto Library on the P5CD144V0B",
      "/docpath": "I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an",
      "/philips_smx_cl_docpath": "I:\\P5_CryptoLib\\SmxCl\\docs\\02_sw_req_an",
      "/relBibilioPath": "..\\Bibliography.doc",
      "pdf_file_size_bytes": 664239,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.cacr.math.uwaterloo.ca/hac/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 77
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0440a.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_MSU.3",
      "ALC_DVS.2",
      "AVA_VLA.4",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0440b.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "16c4bb0e1301bfc73b8ae0c08343cde53f79af838e9271aa8d8a0bf592e9d871",
      "txt_hash": "11be0ce2f917f515447f15d0c8f9ddc13d306d96f748cb60f58b92520cfdd7b3"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "96260b763de45562884f6a97a8a597321748abdc8b03a69baba451afbaacf2b7",
      "txt_hash": "715b48476bc3e63f08767b6b594c008daaa34dbb4135fec6b1d038dff52634d5"
    }
  },
  "status": "archived"
}