This page was not yet optimized for use on mobile
devices.
NXP Secure Smart Card Controller P60x144/080PVA
CSV information
| Status | archived |
|---|---|
| Valid from | 26.07.2012 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | NXP Semiconductors Germany GmbH Business Line Identification |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL6+, ASE_TSS.2, ALC_FLR.1 |
| Protection profiles |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0666-2012
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DESRandomness
RNGEngines
SmartMX2Vendor
NXP, NXP SemiconductorsSecurity level
EAL 6, EAL 4, EAL 5, EAL1, EAL4, EAL5, EAL5+, EAL6, EAL3, EAL7, EAL2, EAL 6 augmented, ITSEC EvaluationClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_INT.1, ADV_INT.2, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DVS.2, ALC_TAT.3, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_TSS.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0035-2007, BSI-CC-PP- 0035-2007Certificates
BSI-DSZ-CC-0666-2012, BSI-DSZ-CC-0666Side-channel analysis
physical probing, side channel, timing attacks, physical tampering, reverse engineering, JILCertification process
Version 1.37, 14 May 2012, NXP Secure Smart Card Controller P60x144/080PVA, NXP Semiconductors (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [8, 9] Evaluation Technical Report BSI-DSZ-CC-0666, Version 1.11, 25 July 2012, T- Systems GEI GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product NXP Secure Smart Card, P60x144/080PVA, Version 1.3, 11 July 2012, T-Systems GEI GmbH (confidential document) 8 specifically • AIS 20, Version 2, 19 September 2011, Funktionalitätsklassen und, Configuration List for the hardware platform, NXP Semiconductors, Rev 1.6, June 15th , 2012 (confidential document) [12] Product Data Sheet, SmartMX2 family P60D080/144 and P60C080/144, NXP Semiconductors, Business, Identification, Rev. 3.3, 24 February 2012 (confidential document) [13] Instruction set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors, Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] Guidance and Operation Manual, NXP Secure Smart Card Controller P60x0880VA/P60x144VA, NXP, Rev. 1.2, 10 April 2012 (confidential document) [15] Wafer and delivery specification, SmartMX2 family P60D080/144 VA and P60C080/144 VA, NXP, Rev. 3.2, 28 February 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors, 1.2, 13 April 2012 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 1.1, February 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D144PVA Configuration List for the firmware, NXP, Rev 0.2, December 14th , 2011 (confidential document) [19] NXP Secure Smart Card Controller P60x144eVA / P60x080eVA Appendix of the Configuration List, composite evaluation, NXP Semiconductors, Rev 01.00, March 28th , 2012 (confidential document) [20] NXP Secure Smart Card Controller P60x144eVA / P60x080eVA Customer specific Appendix of the, List, NXP Semiconductors, Rev 00.01, February 1st , 2012 (confidential document) [21] Order Entry Form, P60D144, Release 0.7, Date: 22.09.2011, OEF ID: 1250, NXP SemiconnductorsStandards
AIS 34, AIS 25, AIS 26, AIS 37, AIS 31, AIS 36, AIS 35, AIS 20, AIS 32, AIS 38Technical reports
BSI TR-02102, BSI 7125, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0666-2012 |
|---|---|
| Subject | Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, Security Controller, Smart Card, EAL 6, NXP, P60" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20120810084544+02'00' |
| Modification date | D:20120830082746+02'00' |
| Pages | 38 |
| Creator | Writer |
| Producer | LibreOffice 3.5 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0666-2012 |
|---|---|
| Certified item | NXP Secure Smart Card Controller P60x144/080PVA |
| Certification lab | BSI |
| Developer | NXP Semiconductors Germany GmbH |
References
Incoming- BSI-DSZ-CC-0845-2012 - archived - NXP Secure Smart Card Controller P60x144/080PVA with IC Dedicated Software FW5.0
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEA, Triple-DEA, TDESAsymmetric Algorithms
ECCRandomness
TRNG, RND, RNGEngines
SmartMX2Vendor
NXP, NXP Semiconductors, PhilipsSecurity level
EAL6, EAL4, EAL6+, EAL4+, EAL 6, EAL6 augmented, EAL4 augmentedClaims
O.RND, O.INTEGRITY_CHK, O.HW_AES, O.CUST_RECONFIG, O.EEPROM_INTEGRITY, O.FM_FW, O.MEM_ACCESS, O.SFR_ACCESS, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, ADV_ARC, ADV_FSP, ADV_IMP, ADV_FSP.4, ADV_SPM, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMS.4, ALC_CMC.4, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ITT.1.1, FDP_ITC.1, FDP_ITC.2, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_FLS.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_ITT.1.1, FRU_FLT.2, FTP_ITT.1Protection profiles
BSI-PP-0035Certificates
BSI-DSZ-CC-0666Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injectionStandards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 46, AIS31, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 18092, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
| Title | Security Target Lite |
|---|---|
| Subject | P60D144PVA |
| Keywords | CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144PVA, P60D080PVA |
| Author | NXP Semiconductors |
| Creation date | D:20120514120203+02'00' |
| Modification date | D:20120830083036+02'00' |
| Pages | 79 |
| Creator | Acrobat PDFMaker 9.0 for Word |
| Producer | Adobe PDF Library 9.0 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0666-2012Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.3, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "94696d7b03c0bcc4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0666-2012",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL6+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"f6d23054061d72ba"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0845-2012"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0918-V5-2023",
"BSI-DSZ-CC-0918-V4-2022",
"BSI-DSZ-CC-0808-V3-2017",
"BSI-DSZ-CC-0885-2013",
"BSI-DSZ-CC-0918-V8-2025",
"BSI-DSZ-CC-0919-V3-2023",
"BSI-DSZ-CC-0831-V4-2021",
"BSI-DSZ-CC-0809-V2-2016",
"BSI-DSZ-CC-0845-V2-2013",
"BSI-DSZ-CC-0957-2015",
"ANSSI-CC-2015/15",
"ANSSI-CC-2016/04",
"BSI-DSZ-CC-0845-2012",
"ANSSI-CC-2015/41",
"BSI-DSZ-CC-0831-V8-2024",
"NSCIB-CC-11-31801-CR3",
"BSI-DSZ-CC-0919-V2-2021",
"BSI-DSZ-CC-0831-V3-2021",
"BSI-DSZ-CC-0886-2013",
"BSI-DSZ-CC-1035-2017",
"NSCIB-CC-11-31801-CR4",
"ANSSI-CC-2016/03",
"ANSSI-CC-2015/37",
"BSI-DSZ-CC-0831-V2-2020",
"BSI-DSZ-CC-0918-V7-2025",
"BSI-DSZ-CC-0831",
"BSI-DSZ-CC-0831-V9-2024",
"BSI-DSZ-CC-0809-V3-2017",
"BSI-DSZ-CC-0809-2013",
"BSI-DSZ-CC-0831-V7-2023",
"BSI-DSZ-CC-0831-V6-2023",
"BSI-DSZ-CC-0808-V2-2016",
"ANSSI-CC-2015/40",
"BSI-DSZ-CC-0817-V2-2016",
"ANSSI-CC-2015/38",
"BSI-DSZ-CC-0919-V4-2025",
"BSI-DSZ-CC-0808-2013",
"BSI-DSZ-CC-0918-V6-2024",
"BSI-DSZ-CC-0957-V2-2016",
"ANSSI-CC-2015/39",
"BSI-DSZ-CC-0817-2013",
"BSI-DSZ-CC-0831-V5-2022"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "NXP Semiconductors Germany GmbH Business Line Identification",
"manufacturer_web": "https://www.nxp.com",
"name": "NXP Secure Smart Card Controller P60x144/080PVA",
"not_valid_after": "2019-09-01",
"not_valid_before": "2012-07-26",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0666a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0666-2012",
"cert_item": "NXP Secure Smart Card Controller P60x144/080PVA",
"cert_lab": "BSI",
"developer": "NXP Semiconductors Germany GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0666": 1,
"BSI-DSZ-CC-0666-2012": 22
}
},
"cc_claims": {
"O": {
"O.C": 5
},
"R": {
"R.O": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0035-2007": 1,
"BSI-CC-PP-0035-2007": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 2,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 2,
"ADV_SPM": 1,
"ADV_SPM.1": 2,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 2,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 3,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 1,
"ALC_FLR.1": 6,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 3
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 2
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 2,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 2,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 2,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 3,
"EAL 5": 3,
"EAL 6": 4,
"EAL 6 augmented": 3,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 7,
"EAL5": 7,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"1.2, 13 April 2012 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 1.1": 1,
"9] Evaluation Technical Report BSI-DSZ-CC-0666, Version 1.11, 25 July 2012, T- Systems GEI GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product NXP Secure Smart Card": 1,
"Configuration List for the hardware platform, NXP Semiconductors, Rev 1.6, June 15th , 2012 (confidential document) [12] Product Data Sheet, SmartMX2 family P60D080/144 and P60C080/144, NXP Semiconductors, Business": 1,
"February 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D144PVA Configuration List for the firmware, NXP": 1,
"Identification, Rev. 3.3, 24 February 2012 (confidential document) [13] Instruction set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors": 1,
"List, NXP Semiconductors, Rev 00.01, February 1st , 2012 (confidential document) [21] Order Entry Form, P60D144, Release 0.7, Date: 22.09.2011, OEF ID: 1250, NXP Semiconnductors": 1,
"P60x144/080PVA, Version 1.3, 11 July 2012, T-Systems GEI GmbH (confidential document) 8 specifically \u2022 AIS 20, Version 2, 19 September 2011, Funktionalit\u00e4tsklassen und": 1,
"Rev 0.2, December 14th , 2011 (confidential document) [19] NXP Secure Smart Card Controller P60x144eVA / P60x080eVA Appendix of the Configuration List": 1,
"Rev. 1.2, 10 April 2012 (confidential document) [15] Wafer and delivery specification, SmartMX2 family P60D080/144 VA and P60C080/144 VA, NXP": 1,
"Rev. 3.2, 28 February 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors": 1,
"Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] Guidance and Operation Manual, NXP Secure Smart Card Controller P60x0880VA/P60x144VA, NXP": 1,
"Version 1.37, 14 May 2012, NXP Secure Smart Card Controller P60x144/080PVA, NXP Semiconductors (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [8": 1,
"composite evaluation, NXP Semiconductors, Rev 01.00, March 28th , 2012 (confidential document) [20] NXP Secure Smart Card Controller P60x144eVA / P60x080eVA Customer specific Appendix of the": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX2": 10
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
},
"SCA": {
"physical probing": 1,
"side channel": 1,
"timing attacks": 1
},
"other": {
"JIL": 4,
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 3,
"AIS 37": 1,
"AIS 38": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"Triple-DES": 2
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 28,
"NXP Semiconductors": 27
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20120810084544+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Security Controller, Smart Card, EAL 6, NXP, P60\"",
"/ModDate": "D:20120830082746+02\u002700\u0027",
"/Producer": "LibreOffice 3.5",
"/Subject": "Certification",
"/Title": "Certification Report BSI-DSZ-CC-0666-2012",
"pdf_file_size_bytes": 697184,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/",
"https://www.bsi.bund.de/zertifizierung"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "0666b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0666": 1
}
},
"cc_claims": {
"O": {
"O.CUST_RECONFIG": 5,
"O.EEPROM_INTEGRITY": 5,
"O.FM_FW": 9,
"O.HW_AES": 7,
"O.INTEGRITY_CHK": 7,
"O.MEM_ACCESS": 9,
"O.RND": 3,
"O.SFR_ACCESS": 9
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 4,
"ADV_FSP.4": 3,
"ADV_FSP.5": 11,
"ADV_IMP": 1,
"ADV_IMP.2": 4,
"ADV_INT.3": 1,
"ADV_SPM": 2,
"ADV_SPM.1": 1,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 4,
"ALC_CMC.4": 3,
"ALC_CMC.5": 4,
"ALC_CMS": 4,
"ALC_CMS.4": 3,
"ALC_CMS.5": 5,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 1,
"ALC_FLR.1": 5,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.2": 6
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.3": 4,
"ATE_DPT.3": 1,
"ATE_FUN.2": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 2,
"EAL4": 3,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL6": 36,
"EAL6 augmented": 3,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 7,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 5,
"FCS_CKM.4": 3,
"FCS_COP.1": 23,
"FCS_COP.1.1": 2,
"FCS_RNG.1": 7,
"FCS_RNG.1.1": 3,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC.1": 36,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 32,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_FLS.1": 1,
"FDP_IFC.1": 11,
"FDP_ITC.1": 5,
"FDP_ITC.2": 5,
"FDP_ITT.1": 14,
"FDP_ITT.1.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 7,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FMT": {
"FMT_LIM.1": 3,
"FMT_LIM.2": 4,
"FMT_MSA.1": 25,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 18,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_SMF.1": 17,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7
},
"FPT": {
"FPT_FLS.1": 7,
"FPT_ITT.1": 13,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 7
},
"FRU": {
"FRU_FLT.2": 7
},
"FTP": {
"FTP_ITT.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX2": 13
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 13
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 13,
"fault injection": 3,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 13,
"Physical Probing": 2,
"physical probing": 1,
"side channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 1
},
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2,
"CCMB-2009-07-004": 2
},
"FIPS": {
"FIPS PUB 197": 3,
"FIPS PUB 46": 1,
"FIPS PUB 46-3": 3
},
"ISO": {
"ISO/IEC 14443": 16,
"ISO/IEC 18092": 2,
"ISO/IEC 7816": 24
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 44
}
},
"DES": {
"3DES": {
"TDEA": 3,
"TDES": 1,
"Triple-DEA": 1,
"Triple-DES": 9
},
"DES": {
"DEA": 2,
"DES": 28
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 102,
"NXP Semiconductors": 27
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Alternative descriptive title": "Security Target Lite",
"/Author": "NXP Semiconductors",
"/CertificationID": "BSI-DSZ-CC-0666",
"/Company": "NXP Semiconductors GmbH Germany",
"/Copyright date": "2012",
"/CreationDate": "D:20120514120203+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 9.0 for Word",
"/Descriptive title": "Security Target Lite",
"/Division": "NXP Semiconductors",
"/Document identifier": " ",
"/Keywords": "CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144PVA, P60D080PVA",
"/ModDate": "D:20120830083036+02\u002700\u0027",
"/Modification date": "14-May-2012",
"/Producer": "Adobe PDF Library 9.0",
"/Product name title": "\u003cnot applicable\u003e",
"/Revision": "Rev. 1.37",
"/Security status": "\u003cSecurity status\u003e",
"/SourceModified": "D:20120514095955",
"/Specification status": "Evaluation documentation Public",
"/Subject": "P60D144PVA",
"/Template date": "29 January 2010",
"/Template version": "2.9.0",
"/Title": "Security Target Lite",
"/docpath": "C:\\localdata\\SysArch\\projects\\id_smx21\\work02\\data\\id_smx21_lib\\id_smx21\\DOCUMENTS\\project_docu\\Evaluation\\Procedure_P60D144\\ASE",
"/list_of_authors": "Thomas Rottschaefer",
"/philips_smx_cl_docpath": "I:\\P5_CryptoLib\\SmxCl\\docs\\99_prj_mgmt\\Templates\\V2.9.0_R1",
"/relBiblioPath": "..\\..\\Bibliography.doc",
"/test_sec_row_naming": "manufacturer area",
"/text_cert_body_long": "Bundesamt fuer Sicherheit in der Informationstechnik",
"/text_cert_body_short": "BSI",
"/text_developer_long": "NXP Semiconductors, Business Unit Identification",
"/text_developer_short": "NXP",
"/text_product_cfgC080": "P60C080PVA",
"/text_product_cfgC144": "P60C144PVA",
"/text_product_cfgD080": "P60D080PVA",
"/text_product_cfgD144": "P60D144PVA",
"/text_product_cfgD144_nameplate": "9050B",
"/text_product_letter": "A",
"/text_product_long": "NXP Secure Smart Card Controller P60x144/080P",
"/text_product_minor": "VA",
"/text_product_short": "P60x144/080PVA",
"/text_sponsor_long": "NXP Semiconductors, Business Unit Identification",
"/text_sponsor_short": "NXP",
"pdf_file_size_bytes": 656626,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]\u0000",
"http://www.nxp.com/\u0000"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 79
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0666a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ASE_TSS.2",
"ALC_FLR.1",
"EAL6+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0666b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "42eaeb039aa1e107df356c5bc017d6c74567026ce1f4e0631acbf4e6b3549e23",
"txt_hash": "091bf0a56e6af111431c8c3200f8c7bc9c7849521ff6bfd5bee0728a2b4f131f"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e7589f702c1a66545453f08f3c10b4164d1e0e74014ca8fe7baea93310802c13",
"txt_hash": "d1bbbf3407476dc6e042ad7cec0455e7663ddd1daf3c534435bccecf5f74e8e6"
}
},
"status": "archived"
}