NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software

CSV information ?

Status active
Valid from 29.11.2019
Valid until 29.11.2024
Scheme 🇩🇪 DE
Manufacturer NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ASE_TSS.2, EAL6+, ALC_FLR.1
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1059-V3-2019

Certificate ?

Extracted keywords

Vendor
NXP, NXP Semiconductors

Security level
EAL 6, EAL 5, EAL 2, EAL 6 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, ASE_TSS.2
Protection profiles
BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1059-V3-2019

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certificate BSI-DSZ-CC-1059-V3-2019
Subject Common Criteria Certification
Keywords Common Criteria, Certification, Zertifizierung, NXP, Smart Card Controller, P6022y VB*
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20191202121647+01'00'
Modification date D:20191202122435+01'00'
Pages 1
Creator Writer
Producer LibreOffice 6.2

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, CBC-MAC
Schemes
MAC
Randomness
TRNG, RNG
Engines
SmartMX2
Block cipher modes
ECB, CBC

Vendor
NXP, NXP Semiconductors

Security level
EAL 6, EAL 5, EAL 2, EAL 1, EAL 4, EAL 2+, EAL 5+, EAL 6 augmented
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ASE_TSS.2
Protection profiles
BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-V2-2019
Evaluation facilities
TÃœV Informationstechnik

Side-channel analysis
physical probing, physical tampering, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Smart Card Controller P6022y VB – Security Target, Version 2.6, 2019-08-23, NXP Semiconductors (confidential document) [7] Evaluation Technical Report BSI-DSZ-CC-1059-V3-2019, Version 2, 2019-11-20, TÜV, GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, Evaluation (ETR COMP) for the P6022y VB VB, version 2, 2019-11-20, TÜV Informationstechnik GmbH (confidential document) [11] Product Data Sheet - SmartMX2 family P6022y VB, Secure high-performance smart card controller, Version 3.6, 2019-08-22, NXP Semiconductors (confidential document) [12] Instruction Set for the SmartMX2 family, Secure smart card controller, Version 3.1, NXP Semiconductors (confidential document) [13] Information on Guidance and Operation, NXP Secure Smart Card Controller P6022y VB, Version 1, 2018-11-27, NXP Semiconductors (confidential document) 7 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, SmartMX2 P6022y VB, Wafer and delivery specification, Version 3.3, 2019-07-12, NXP Semiconductors (confidential document) [15] Product data sheet addendum - SmartMX2 P602xy VB family, Firmware Interface Specification, 3.7, 2017-05-15, NXP Semiconductors (confidential document) [16] Objective Data Sheet Addendum - SmartMX2 P602xy VB Family Firmware Interface Specification, Version 1.1, 2016-05-23, NXP Semiconductors (confidential document) [17] Product data sheet addendum - SmartMX2 P6022y VB ATMC Wafer and delivery specification, 1.5, 2019-08-02, NXP Semiconductors (confidential document) [18] Order Entry Form Delivery Data, Version 2.1, 2019-11-18, NXP Semiconductors [19] NXP Secure, Controller P6022y VB Configuration List - Hardware IC, Version 1.6, 2019-08-09, NXP Semiconductors (confidential document) [20] NXP Secure Smart Card Controller P6022y VB Evaluation Reference List, Version 2.5, 2019-11-20, NXP Semiconductors (confidential document) 26 / 32 BSI-DSZ-CC-1059-V3-2019 Certification Report C. Excerpts from the Criteria For the

Standards
FIPS197, AIS 34, AIS 25, AIS 37, AIS 31, AIS 36, AIS31, AIS 35, AIS 1, AIS 20, AIS 26, AIS 32, AIS 38, AIS39, AIS46, AIS 47, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 14443, ISO/IEC 7816
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1059-V3-2019
Subject Common Criteria Certification
Keywords "Common Criteria, Certification, Zertifizierung, NXP, Smart Card Controller, P6022y VB*"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20191202120754+01'00'
Modification date D:20191202122616+01'00'
Pages 32
Creator Writer
Producer LibreOffice 6.2

Frontpage

Certificate ID BSI-DSZ-CC-1059-V3-2019
Certified item NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software
Certification lab BSI
Developer NXP Semiconductors Germany GmbH

References

Outgoing Incoming
  • ANSSI-CC-2020/37 - active - LDS Applet EAC with PACE on ID-One Cosmo V8.2 on NXP P60D145 (version 03 00 00 00)
  • ANSSI-CC-2020/51 - active - IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2
  • ANSSI-CC-2020/46 - active - ChipDoc v2 on JCOP 3 P60 in ICAO BAC configuration
  • ANSSI-CC-2020/50 - active - IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2
  • ANSSI-CC-2020/47 - active - ChipDoc v2 on JCOP 3 P60 in ICAO EAC with PACE configuration
  • ANSSI-CC-2020/38 - active - LDS Applet PACE with CAM, CA and AA on ID-One Cosmo V8.2 on NXP P60D145 (version 03 00 00 00)
  • ANSSI-CC-2020/36 - active - LDS Applet EAC with AA on ID-One Cosmo V8.2 on NXP P60D145 (version 03 00 00 00)
  • ANSSI-CC-2020/26 - active - Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145
  • ANSSI-CC-2020/53 - active - IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2
  • ANSSI-CC-2020/52 - active - IAS ECC V2, version 1.3 en configuration #3 sur la plateforme ID-One Cosmo v8.2
  • ANSSI-CC-2020/35 - active - LDS Applet BAC with AA and CA on ID-One Cosmo V8.2 on NXP P60D145 (version 03 00 00 00)
  • ANSSI-CC-2020/48 - active - ChipDoc v2 on JCOP 3 P60 in SSCD configuration
  • BSI-DSZ-CC-1059-V4-2021 - active - NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDES, TDEA, CBC-MAC
Asymmetric Algorithms
ECC
Schemes
MAC
Randomness
TRNG, RND, RNG
Engines
SmartMX2, SmartMX
Block cipher modes
ECB, CBC

Vendor
NXP, NXP Semiconductors, NXP Semiconductors N.V

Security level
EAL6, EAL6+, EAL4, EAL4+, EAL6 augmented, EAL4 augmented
Claims
O.RND, O.TDES, O.AES, O.CUST_RECONF_PLAIN, O.EEPROM_INTEGRITY, O.FM_FW, O.MEM_ACCESS, O.SFR_ACCESS, O.PUF, O.SFR_, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, ADV_ARC, ADV_FSP, ADV_IMP, ADV_FSP.4, ADV_SPM, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMS.4, ALC_CMC.4, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RNG.1, FCS_COP.1, FCS_CKM.4, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_COP.1.1, FCS_CKM.4.1, FCS_CKM.1.1, FCS_CKM.2, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDC.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ROL.1, FIA_UID.2, FIA_UAU.2, FIA_UAU.5, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_MSA.1.1, FMT_SMR.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_TDC.1, FPT_RPL.1, FRU_FLT.2, FTP_TRP.1
Protection profiles
BSI-PP-0084-2014
Certificates
BSI-DSZ-CC-1059

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injection

Standards
FIPS 197, FIPS PUB 197, NIST SP 800-67, NIST SP 800-38A, AIS31, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9797-1, ISO/IEC 18092, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title Security Target Lite
Subject NXP Secure Smart Card Controller P6022y VB
Keywords CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB
Author NXP B.V.
Creation date D:20190823112800+01'00'
Pages 101
Creator DITA Open Toolkit
Producer Apache FOP Version 1.1

References

Incoming
  • ANSSI-CC-2020/37 - active - LDS Applet EAC with PACE on ID-One Cosmo V8.2 on NXP P60D145 (version 03 00 00 00)
  • ANSSI-CC-2020/38 - active - LDS Applet PACE with CAM, CA and AA on ID-One Cosmo V8.2 on NXP P60D145 (version 03 00 00 00)
  • ANSSI-CC-2020/36 - active - LDS Applet EAC with AA on ID-One Cosmo V8.2 on NXP P60D145 (version 03 00 00 00)
  • ANSSI-CC-2020/35 - active - LDS Applet BAC with AA and CA on ID-One Cosmo V8.2 on NXP P60D145 (version 03 00 00 00)

Heuristics ?

Certificate ID: BSI-DSZ-CC-1059-V3-2019

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ALC_CMC.5, ATE_IND.2, ADV_IMP.2, ADV_ARC.1, ATE_FUN.2, ASE_SPD.1, ASE_REQ.2, ASE_TSS.2, AGD_OPE.1, ATE_COV.3, ALC_TAT.3, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ASE_INT.1, ADV_TDS.5, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2

Similar certificates

Name Certificate ID
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V2-2019 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V5-2022 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-2018 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V4-2021 Compare
NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0973-2016 Compare
NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0973-V2-2016 Compare
NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6021P VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6021M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0955-V2-2016 Compare
NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6021P VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6021M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0955-2016 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V2-2019 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V4-2021 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V5-2022 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V3-2019 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-2018 Compare
NXP Secure Smart Card Controller P60x017/041PVD including IC Dedicated Software BSI-DSZ-CC-0896-2014 Compare
NXP Secure Smart Card Controller P60x017/041PVE including IC Dedicated Software BSI-DSZ-CC-0954-2015 Compare
NXP Secure Smart Card Controller P6021y VA including IC Dedicated Software BSI-DSZ-CC-0981-2016 Compare
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software BSI-DSZ-CC-0977-2017 Compare
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software BSI-DSZ-CC-0977-V3-2021 Compare
NXP Secure Smart Card Controllers P5CC008V1A, P5CC012V1A each including IC Dedicated Software BSI-DSZ-CC-0771-2011 Compare
NXP Secure Smart Card Controller P61N1M3PVD/VE including IC Dedicated Software BSI-DSZ-CC-0824-2014 Compare
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software BSI-DSZ-CC-0977-V2-2019 Compare
NXP Secure Smart Card Controller P60D144/080MVA including IC Dedicated Software with MIFARE Plus MF1PLUSx0 BSI-DSZ-CC-0840-2013 Compare
NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/V1A(s) each including IC Dedicated Software BSI-DSZ-CC-0855-2013 Compare
NXP Secure Smart Card Controller P60D024/016/012MVB including IC Dedicated Software with MIFARE Plus MF1PLUSx0 BSI-DSZ-CC-0842-2013 Compare
NXP Secure Smart Card Controller P60D080/052/040MVC including IC Dedicated Software with MIFARE Plus MF1PLUSx0 BSI-DSZ-CC-0871-2013 Compare
NXP Secure Smart Card Controller P5CT072V0N, P5CD072V0N, P5CD036V0N, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software BSI-DSZ-CC-0375-2007 Compare
NXP Secure PKI Smart Card Controllers P5CD145V0A, MSO; P5CC145V0A, MSO; P5CD128V0A, MSO and P5CC128V0A, MSO; each including IC Dedicated Software BSI-DSZ-CC-0645-2010 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB including IC Dedicated Software with MIFARE Plus MF1PLUSx0 or MIFARE DESFire EV1 BSI-DSZ-CC-0830-2013 Compare
NXP Secure Smart Card Controller P60x144/080yVA including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 BSI-DSZ-CC-0870-2014 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB/yVB(Y) including IC Dedicated Software with MIFARE Plus MF1PLUSx0 or MIFARE DESFire EV1 BSI-DSZ-CC-0830-V2-2014 Compare
NXP Secure Smart Card Controller P60D080/052/040yVC including IC Dedicated Software with MIFARE Plus MF1PLUSx0 or with MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 BSI-DSZ-CC-0897-2013 Compare
NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 BSI-DSZ-CC-0897-V2-2014 Compare
NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software BSI-DSZ-CC-0858-V2-2015 Compare
NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software BSI-DSZ-CC-0858-2013 Compare
NXP Secure Smart Card Controller MF3F60x1 with IC Dedicated Support Software BSI-DSZ-CC-0587-2010 Compare
NXP Secure Smart Card Controller P60D024/016/012PVB with IC Dedicated Software BSI-DSZ-CC-0810-2012 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library BSI-DSZ-CC-1040-2019 Compare
NXP P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software BSI-DSZ-CC-0584-2009 Compare
NXP Secure Smart Card Controller P60x144/080PVA with IC Dedicated Software FW5.0 BSI-DSZ-CC-0845-2012 Compare
NXP Secure Smart Card Controller P5CD144V0B, P5CN144V0B and P5CC144V0B each with specific IC Dedicated Software BSI-DSZ-CC-0411-2007 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software BSI-DSZ-CC-0410-2007 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1) BSI-DSZ-CC-1149-2022 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CC080V0B, P5CN080V0B, P5CC073V0B each with specific IC Dedicated Software BSI-DSZ-CC-0700-2011 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B and P5CC073V0B each with specific IC Dedicated Software BSI-DSZ-CC-0680-2010 Compare
NXP Secure Smart Card Controller P5CD040V0B, P5CC040V0B, P5CD020V0B and P5CC021V0B each with specific IC Dedicated Software BSI-DSZ-CC-0404-2007 Compare
NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software BSI-DSZ-CC-0810-V2-2014 Compare
NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)PVG with IC Dedicated Software BSI-DSZ-CC-0837-V2-2014 Compare
NXP Secure Smart Card Controller P60x080/052/040yVC(Y/Z/A)/yVG with IC Dedicated Software BSI-DSZ-CC-0837-V3-2016 Compare
NXP Smart Card Controller P5CC037V0A with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0550-2008 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software BSI-DSZ-CC-0939-V3-2018 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1136-V2-2022 Compare
NXP Secure Smart Card Controller P60D024/016/012PVB(Y/Z/A)/PVF with IC Dedicated Software BSI-DSZ-CC-0939-2015 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software BSI-DSZ-CC-0939-V2-2016 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1149-V3-2023 Compare
NXP Secure Smart Card Controller P60x144/080PVA/PVA(Y) with IC Dedicated Software FW5.0 BSI-DSZ-CC-0845-V2-2013 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1149-V2-2023 Compare
NXP Smart Card Controller P5CC052V0A with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0551-2008 Compare
NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0 BSI-DSZ-CC-0440-2008 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) BSI-DSZ-CC-1136-V3-2022 Compare
NXP Smart Card Controller P5CD040V0B with IC dedicated software: Secured Crypto Library Release 2.0 to EAL5+ BSI-DSZ-CC-0439-2008 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) BSI-DSZ-CC-1136-V4-2024 Compare
NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software BSI-DSZ-CC-0978-V2-2017 Compare
NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software BSI-DSZ-CC-0978-2016 Compare
NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software BSI-DSZ-CC-0978-V3-2019 Compare
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A, P5CC012V0A all with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0549-2008 Compare
Philips Secure Smart Card Controller P5CT072V0N including OM9500/1 and OM9501/2, P5CD072V0N and P5CD036V0N with specific IC Dedicated Software BSI-DSZ-CC-0312-2005 Compare
Philips Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q,P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software BSI-DSZ-CC-0349-2006 Compare
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0a and P5CC012V0A each with IC Dedicated Software: Secured Crypto Library Release 2.0 to CC EAL5+ BSI-DSZ-CC-0464-2008 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software BSI-DSZ-CC-0827-V8-2020 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Toolbox, Base, FTL, SCL, HCL, and PSL, and with specific IC dedicated software BSI-DSZ-CC-0827-V7-2018 Compare
Infineon smart card IC (Security Controller) M9900 A21 with specific IC dedicated software BSI-DSZ-CC-0791-2012 Compare
Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software BSI-DSZ-CC-0827-V4-2016 Compare
Infineon Smart Card IC (Security Controller), SLE66CL80P / m1457a14 and SLE66CL81P / m1436a14 with specific IC Dedicated Software BSI-DSZ-CC-0401-2006 Compare
Infineon Smart Card IC (Security Controller) SLE66CL80P/m1457-a14 and SLE66CL81P/m1436-a14 with specific IC Dedicated Software BSI-DSZ-CC-0354-2006 Compare
Infineon Smart Card IC (Security Controller) SLE66CX642P/m1485b16 with RSA 2048 V1.30 and specific IC Dedicated Software BSI-DSZ-CC-0315-2005 Compare
Infineon Smart Card IC (Security Controller) SLE66CX322P/m1484b14 and m1484f18 with RSA 2048 V1.30 and specific IC Dedicated Software BSI-DSZ-CC-0266-2005 Compare
Infineon Smart Card IC (Security Controller) SLE66CLX320P / m1559b19 and SLE66CLX321P / m1359b19 both with RSA2048 V1.3 and specific IC Dedicated Software BSI-DSZ-CC-0337-2005 Compare
Showing 5 out of 77.

References ?

Updates ?

  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BAROC_SC_PP_V1.0', 'JAVA_OC', 'SECURITY_IC_AUGP_V1.0']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '93e8c2f4ad9c9647ed408499ce0846c554206140a17f0949ef7d25adbc7e2cd5', 'txt_hash': 'd0595a97c911947f7fface0fce4c18c07822bc5cc974c8ed7eaf30ee70c4920a'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0078f060906be3a123aeb9711f12f3b60c54373663bee71c319a3dbdc14f5ae9', 'txt_hash': 'b2b1b1702cb90cdd6351985f8208a125d0e331db639fdd1cc36d339649b0be17'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 848910, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 101, '/Title': 'Security Target Lite', '/Author': 'NXP B.V.', '/Subject': 'NXP Secure Smart Card Controller P6022y VB', '/Keywords': 'CC Security Evaluation, Security Target Lite, Functional\n Requirements, Security Functionality, Assurance Level 6+, P6022y VB, P6022P VB, P6022X VB, P6022M\n VB, P6022D VB, P6022J VB', '/Creator': 'DITA Open Toolkit', '/Producer': 'Apache FOP Version 1.1', '/CreationDate': "D:20190823112800+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 284152, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20191202121647+01'00'", '/Creator': 'Writer', '/Keywords': 'Common Criteria, Certification, Zertifizierung, NXP, Smart Card Controller, P6022y VB*', '/ModDate': "D:20191202122435+01'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'Common Criteria Certification', '/Title': 'Certificate BSI-DSZ-CC-1059-V3-2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 2}}, 'cc_security_level': {'EAL': {'EAL6': 44, 'EAL6+': 11, 'EAL4': 1, 'EAL4+': 2, 'EAL6 augmented': 5, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 11, 'ADV_IMP.2': 3, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 1, 'ADV_ARC': 1, 'ADV_FSP': 3, 'ADV_IMP': 1, 'ADV_FSP.4': 3, 'ADV_SPM': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 6, 'ALC_CMC.5': 4, 'ALC_CMS.5': 5, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 3, 'ALC_CMC': 3, 'ALC_CMS.4': 3, 'ALC_CMC.4': 3}, 'ATE': {'ATE_COV.3': 3, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 6, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 7, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG.1': 8, 'FCS_COP.1': 45, 'FCS_CKM.4': 46, 'FCS_RNG.1.1': 3, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 17, 'FCS_COP.1.1': 4, 'FCS_CKM.4.1': 3, 'FCS_CKM.1.1': 1, 'FCS_CKM.2': 2}, 'FDP': {'FDP_SDC.1': 16, 'FDP_SDI.2': 36, 'FDP_ITT.1': 6, 'FDP_IFC.1': 10, 'FDP_SDI.1': 5, 'FDP_SDI.2.1': 5, 'FDP_SDI.2.2': 5, 'FDP_SDC.1.1': 2, 'FDP_ITC.1': 14, 'FDP_ITC.2': 16, 'FDP_ACC.1': 37, 'FDP_ACC.1.1': 2, 'FDP_ACF.1': 34, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_ROL.1': 1}, 'FIA': {'FIA_UID.2': 2, 'FIA_UAU.2': 2, 'FIA_UAU.5': 2}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 4, 'FMT_MSA.3': 24, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1': 28, 'FMT_MSA.1.1': 2, 'FMT_SMR.1': 7, 'FMT_SMF.1': 22, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_PHP.3': 8, 'FPT_ITT.1': 6, 'FPT_TDC.1': 2, 'FPT_RPL.1': 2}, 'FRU': {'FRU_FLT.2': 8}, 'FTP': {'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RND': 3, 'O.TDES': 7, 'O.AES': 7, 'O.CUST_RECONF_PLAIN': 6, 'O.EEPROM_INTEGRITY': 5, 'O.FM_FW': 9, 'O.MEM_ACCESS': 10, 'O.SFR_ACCESS': 8, 'O.PUF': 6, 'O.SFR_': 1}, 'T': {'T.RND': 2}}, 'vendor': {'NXP': {'NXP': 212, 'NXP Semiconductors': 45, 'NXP Semiconductors N.V': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 82}}, 'DES': {'DES': {'DES': 8, 'DEA': 1}, '3DES': {'Triple-DES': 19, 'TDES': 45, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 2}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 8}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 14}}, 'cipher_mode': {'ECB': {'ECB': 6}, 'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 16, 'SmartMX': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 11, 'Physical Probing': 2, 'physical probing': 1, 'side channel': 1, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 10, 'malfunction': 2, 'fault injection': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 3, 'FIPS PUB 197': 2}, 'NIST': {'NIST SP 800-67': 4, 'NIST SP 800-38A': 3}, 'BSI': {'AIS31': 2}, 'ISO': {'ISO/IEC 7816': 28, 'ISO/IEC 14443': 20, 'ISO/IEC 9797-1': 1, 'ISO/IEC 18092': 2}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059-V3-2019': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 6': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1, 'ALC_FLR': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 1, 'NXP Semiconductors': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 1059V3b_pdf.pdf.
    • The cert_filename property was set to 1059V3c_pdf.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/35', 'ANSSI-CC-2020/38', 'ANSSI-CC-2020/36', 'ANSSI-CC-2020/37']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/35', 'ANSSI-CC-2020/38', 'ANSSI-CC-2020/36', 'ANSSI-CC-2020/37']}} data.
    • The report_references property was updated, with the {'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-23-67206-CR']}}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-V2-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1059-2018', 'BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-1059-V2-2019']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 19.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'beabfcf46ae26772bc0474f91e18af5e1c0f5a80ee7e0cb572b1acb353abb6fd', 'txt_hash': '80d9fd4c14d9e3830911e220ab8a0680cb781b53acf97479f466db4fe2db8918'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 487378, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 32, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20191202120754+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, NXP, Smart Card Controller, P6022y VB*"', '/ModDate': "D:20191202122616+01'00'", '/Producer': 'LibreOffice 6.2', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-1059-V3-2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.sogis.eu/']}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1059-V3-2019', 'cert_item': 'NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 and ASE_TSS.2'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059-V3-2019': 20, 'BSI-DSZ-CC-1059-V2-2019': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 4}}, 'cc_security_level': {'EAL': {'EAL 6': 5, 'EAL 5': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 4': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 4, 'ALC_FLR': 3, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ASE': {'ASE_TSS.2': 4}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 5}, 'R': {'R.O': 5}}, 'vendor': {'NXP': {'NXP': 33, 'NXP Semiconductors': 31}}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9}}, 'DES': {'DES': {'DES': 3}, '3DES': {'TDES': 1, 'Triple-DES': 4, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RNG': 4}}, 'cipher_mode': {'ECB': {'ECB': 6}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 11}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1}, 'FI': {'physical tampering': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS197': 3}, 'BSI': {'AIS 34': 2, 'AIS 25': 2, 'AIS 37': 1, 'AIS 31': 3, 'AIS 36': 2, 'AIS31': 2, 'AIS 35': 2, 'AIS 1': 1, 'AIS 20': 1, 'AIS 26': 1, 'AIS 32': 1, 'AIS 38': 1, 'AIS39': 1, 'AIS46': 1, 'AIS 47': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2, 'ISO/IEC 14443': 4, 'ISO/IEC 7816': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Smart Card Controller P6022y VB – Security Target, Version 2.6, 2019-08-23, NXP Semiconductors (confidential document) [7] Evaluation Technical Report BSI-DSZ-CC-1059-V3-2019, Version 2, 2019-11-20, TÃœV': 1, 'GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January': 1, 'Evaluation (ETR COMP) for the P6022y VB VB, version 2, 2019-11-20, TÃœV Informationstechnik GmbH (confidential document) [11] Product Data Sheet - SmartMX2 family P6022y VB, Secure high-performance smart card controller': 1, 'Version 3.6, 2019-08-22, NXP Semiconductors (confidential document) [12] Instruction Set for the SmartMX2 family, Secure smart card controller, Version 3.1': 1, 'NXP Semiconductors (confidential document) [13] Information on Guidance and Operation, NXP Secure Smart Card Controller P6022y VB, Version 1': 1, '2018-11-27, NXP Semiconductors (confidential document) 7 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung': 1, 'SmartMX2 P6022y VB, Wafer and delivery specification, Version 3.3, 2019-07-12, NXP Semiconductors (confidential document) [15] Product data sheet addendum - SmartMX2 P602xy VB family, Firmware Interface Specification': 1, '3.7, 2017-05-15, NXP Semiconductors (confidential document) [16] Objective Data Sheet Addendum - SmartMX2 P602xy VB Family Firmware Interface Specification': 1, 'Version 1.1, 2016-05-23, NXP Semiconductors (confidential document) [17] Product data sheet addendum - SmartMX2 P6022y VB ATMC Wafer and delivery specification': 1, '1.5, 2019-08-02, NXP Semiconductors (confidential document) [18] Order Entry Form Delivery Data, Version 2.1, 2019-11-18, NXP Semiconductors [19] NXP Secure': 1, 'Controller P6022y VB Configuration List - Hardware IC, Version 1.6, 2019-08-09, NXP Semiconductors (confidential document) [20] NXP Secure Smart Card Controller P6022y VB Evaluation Reference List, Version 2.5, 2019-11-20': 1, 'NXP Semiconductors (confidential document) 26 / 32 BSI-DSZ-CC-1059-V3-2019 Certification Report C. Excerpts from the Criteria For the': 1}}}.
    • The report_filename property was set to 1059V3a_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1059-V3-2019.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/26', 'ANSSI-CC-2020/48', 'ANSSI-CC-2020/35', 'ANSSI-CC-2020/53', 'ANSSI-CC-2020/50', 'ANSSI-CC-2020/36', 'ANSSI-CC-2020/51', 'ANSSI-CC-2020/52', 'BSI-DSZ-CC-1059-V4-2021', 'ANSSI-CC-2020/46', 'ANSSI-CC-2020/47', 'ANSSI-CC-2020/38', 'ANSSI-CC-2020/37']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6', 'ANSSI-CC-2020/50', 'ANSSI-CC-2020/53-R01', 'ANSSI-CC-2020/52', 'ANSSI-CC-2020/47', 'ANSSI-CC-2020/38', 'ANSSI-CC-2023/38', 'ANSSI-CC-2020/52-R01', 'ANSSI-CC-2020/48', 'NSCIB-CC-2200035-01-CR', 'ANSSI-CC-2020/53', 'ANSSI-CC-2020/51', 'ANSSI-CC-2020/50-R01', 'ANSSI-CC-2020/26', 'ANSSI-CC-2020/37', 'NSCIB-CC-98209-CR5', 'ANSSI-CC-2019/43-R01', 'ANSSI-CC-2020/35', 'ANSSI-CC-2020/26-R01', 'ANSSI-CC-2020/51-R01', 'BSI-DSZ-CC-1059-V4-2021', 'ANSSI-CC-2020/46', 'BSI-DSZ-CC-1059-V5-2022', 'ANSSI-CC-2020/36']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1059V3a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1059V3b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/35', 'ANSSI-CC-2020/38', 'ANSSI-CC-2020/48']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-98209-CR5', 'ANSSI-CC-2020/48', 'ANSSI-CC-2020/35', 'ANSSI-CC-2020/51-R01', 'ANSSI-CC-2020/38']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0973-2016']}}} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1059V3c_pdf.pdf",
  "dgst": "be5c86302bdf6805",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1059-V3-2019",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/46",
          "ANSSI-CC-2020/35",
          "ANSSI-CC-2020/26",
          "ANSSI-CC-2020/48",
          "BSI-DSZ-CC-1059-V4-2021",
          "ANSSI-CC-2020/38",
          "ANSSI-CC-2020/47",
          "ANSSI-CC-2020/51",
          "ANSSI-CC-2020/36",
          "ANSSI-CC-2020/37",
          "ANSSI-CC-2020/53",
          "ANSSI-CC-2020/52",
          "ANSSI-CC-2020/50"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1059-V2-2019"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/46",
          "ANSSI-CC-2020/52-R01",
          "ANSSI-CC-2020/50-R01",
          "ANSSI-CC-2020/53-R01",
          "ANSSI-CC-2020/26",
          "ANSSI-CC-2020/48",
          "BSI-DSZ-CC-1059-V4-2021",
          "ANSSI-CC-2020/38",
          "ANSSI-CC-2020/50",
          "ANSSI-CC-2023/38",
          "ANSSI-CC-2020/35",
          "BSI-DSZ-CC-1059-V5-2022",
          "ANSSI-CC-2019/43-R01",
          "NSCIB-CC-23-67206-CR",
          "ANSSI-CC-2020/37",
          "NSCIB-CC-2200035-01-CR",
          "NSCIB-CC-98209-CR5",
          "ANSSI-CC-2020/26-R01",
          "ANSSI-CC-2020/47",
          "ANSSI-CC-2020/51",
          "ANSSI-CC-2020/51-R01",
          "ANSSI-CC-2020/36",
          "ANSSI-CC-2020/53",
          "ANSSI-CC-2020/52"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0973-2016",
          "BSI-DSZ-CC-1059-2018",
          "BSI-DSZ-CC-1059-V2-2019",
          "BSI-DSZ-CC-0973-V2-2016"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/37",
          "ANSSI-CC-2020/38",
          "ANSSI-CC-2020/36",
          "ANSSI-CC-2020/35"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/37",
          "ANSSI-CC-2020/38",
          "ANSSI-CC-2020/36",
          "ANSSI-CC-2020/35"
        ]
      },
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software",
  "not_valid_after": "2024-11-29",
  "not_valid_before": "2019-11-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1059V3c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1059-V3-2019": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.1": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 5": 1,
          "EAL 6": 1,
          "EAL 6 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20191202121647+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, NXP, Smart Card Controller, P6022y VB*",
      "/ModDate": "D:20191202122435+01\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certificate BSI-DSZ-CC-1059-V3-2019",
      "pdf_file_size_bytes": 284152,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1059V3a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 and ASE_TSS.2",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1059-V3-2019",
        "cert_item": "NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software",
        "cert_lab": "BSI",
        "developer": "NXP Semiconductors Germany GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1059-V2-2019": 2,
          "BSI-DSZ-CC-1059-V3-2019": 20
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 5
        },
        "R": {
          "R.O": 5
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 4
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 3,
          "ALC_FLR.1": 4,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_TSS.2": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 1,
          "EAL 5": 4,
          "EAL 5+": 1,
          "EAL 6": 5,
          "EAL 6 augmented": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "1.5, 2019-08-02, NXP Semiconductors (confidential document) [18] Order Entry Form Delivery Data, Version 2.1, 2019-11-18, NXP Semiconductors [19] NXP Secure": 1,
          "2018-11-27, NXP Semiconductors (confidential document) 7 specifically \u2022 AIS 1, Version 14, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung": 1,
          "3.7, 2017-05-15, NXP Semiconductors (confidential document) [16] Objective Data Sheet Addendum - SmartMX2 P602xy VB Family Firmware Interface Specification": 1,
          "Controller P6022y VB Configuration List - Hardware IC, Version 1.6, 2019-08-09, NXP Semiconductors (confidential document) [20] NXP Secure Smart Card Controller P6022y VB Evaluation Reference List, Version 2.5, 2019-11-20": 1,
          "Evaluation (ETR COMP) for the P6022y VB VB, version 2, 2019-11-20, T\u00dcV Informationstechnik GmbH (confidential document) [11] Product Data Sheet - SmartMX2 family P6022y VB, Secure high-performance smart card controller": 1,
          "GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January": 1,
          "NXP Semiconductors (confidential document) 26 / 32 BSI-DSZ-CC-1059-V3-2019 Certification Report C. Excerpts from the Criteria For the": 1,
          "NXP Semiconductors (confidential document) [13] Information on Guidance and Operation, NXP Secure Smart Card Controller P6022y VB, Version 1": 1,
          "Smart Card Controller P6022y VB \u2013 Security Target, Version 2.6, 2019-08-23, NXP Semiconductors (confidential document) [7] Evaluation Technical Report BSI-DSZ-CC-1059-V3-2019, Version 2, 2019-11-20, T\u00dcV": 1,
          "SmartMX2 P6022y VB, Wafer and delivery specification, Version 3.3, 2019-07-12, NXP Semiconductors (confidential document) [15] Product data sheet addendum - SmartMX2 P602xy VB family, Firmware Interface Specification": 1,
          "Version 1.1, 2016-05-23, NXP Semiconductors (confidential document) [17] Product data sheet addendum - SmartMX2 P6022y VB ATMC Wafer and delivery specification": 1,
          "Version 3.6, 2019-08-22, NXP Semiconductors (confidential document) [12] Instruction Set for the SmartMX2 family, Secure smart card controller, Version 3.1": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "ECB": {
          "ECB": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX2": 11
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 4
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        },
        "SCA": {
          "physical probing": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 20": 1,
          "AIS 25": 2,
          "AIS 26": 1,
          "AIS 31": 3,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 2,
          "AIS 37": 1,
          "AIS 38": 1,
          "AIS 47": 1,
          "AIS31": 2,
          "AIS39": 1,
          "AIS46": 1
        },
        "FIPS": {
          "FIPS197": 3
        },
        "ISO": {
          "ISO/IEC 14443": 4,
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 7816": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 1,
            "Triple-DES": 4
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 33,
          "NXP Semiconductors": 31
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20191202120754+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, NXP, Smart Card Controller, P6022y VB*\"",
      "/ModDate": "D:20191202122616+01\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-1059-V3-2019",
      "pdf_file_size_bytes": 487378,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.sogis.eu/",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierungsreporte"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 32
    },
    "st_filename": "1059V3b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1059": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.AES": 7,
          "O.CUST_RECONF_PLAIN": 6,
          "O.EEPROM_INTEGRITY": 5,
          "O.FM_FW": 9,
          "O.MEM_ACCESS": 10,
          "O.PUF": 6,
          "O.RND": 3,
          "O.SFR_": 1,
          "O.SFR_ACCESS": 8,
          "O.TDES": 7
        },
        "T": {
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084-2014": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 3,
          "ADV_FSP.4": 3,
          "ADV_FSP.5": 11,
          "ADV_IMP": 1,
          "ADV_IMP.2": 3,
          "ADV_INT.3": 1,
          "ADV_SPM": 2,
          "ADV_SPM.1": 1,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 3,
          "ALC_CMC.4": 3,
          "ALC_CMC.5": 4,
          "ALC_CMS": 3,
          "ALC_CMS.4": 3,
          "ALC_CMS.5": 5,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 6,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.2": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.3": 3,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL4+": 2,
          "EAL6": 44,
          "EAL6 augmented": 5,
          "EAL6+": 11
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 7,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 17,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 46,
          "FCS_CKM.4.1": 3,
          "FCS_COP.1": 45,
          "FCS_COP.1.1": 4,
          "FCS_RNG.1": 8,
          "FCS_RNG.1.1": 3,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC.1": 37,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 34,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 10,
          "FDP_ITC.1": 14,
          "FDP_ITC.2": 16,
          "FDP_ITT.1": 6,
          "FDP_ROL.1": 1,
          "FDP_SDC.1": 16,
          "FDP_SDC.1.1": 2,
          "FDP_SDI.1": 5,
          "FDP_SDI.2": 36,
          "FDP_SDI.2.1": 5,
          "FDP_SDI.2.2": 5
        },
        "FIA": {
          "FIA_UAU.2": 2,
          "FIA_UAU.5": 2,
          "FIA_UID.2": 2
        },
        "FMT": {
          "FMT_LIM.1": 3,
          "FMT_LIM.2": 4,
          "FMT_MSA.1": 28,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 24,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_SMF.1": 22,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 7
        },
        "FPT": {
          "FPT_FLS.1": 8,
          "FPT_ITT.1": 6,
          "FPT_PHP.3": 8,
          "FPT_RPL.1": 2,
          "FPT_TDC.1": 2
        },
        "FRU": {
          "FRU_FLT.2": 8
        },
        "FTP": {
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "ECB": {
          "ECB": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 1,
          "SmartMX2": 16
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 5,
          "RNG": 14
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 10,
          "fault injection": 2,
          "malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 11,
          "Physical Probing": 2,
          "physical probing": 1,
          "side channel": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS 197": 3,
          "FIPS PUB 197": 2
        },
        "ISO": {
          "ISO/IEC 14443": 20,
          "ISO/IEC 18092": 2,
          "ISO/IEC 7816": 28,
          "ISO/IEC 9797-1": 1
        },
        "NIST": {
          "NIST SP 800-38A": 3,
          "NIST SP 800-67": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 82
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 45,
            "Triple-DES": 19
          },
          "DES": {
            "DEA": 1,
            "DES": 8
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 212,
          "NXP Semiconductors": 45,
          "NXP Semiconductors N.V": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP B.V.",
      "/CreationDate": "D:20190823112800+01\u002700\u0027",
      "/Creator": "DITA Open Toolkit",
      "/Keywords": "CC Security Evaluation, Security Target Lite, Functional\n   Requirements, Security Functionality, Assurance Level 6+, P6022y VB, P6022P VB, P6022X VB, P6022M\n   VB, P6022D VB, P6022J VB",
      "/Producer": "Apache FOP Version 1.1",
      "/Subject": "NXP Secure Smart Card Controller P6022y VB",
      "/Title": "Security Target Lite",
      "pdf_file_size_bytes": 848910,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 101
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "BAROC_SC_PP_V1.0",
            "JAVA_OC",
            "SECURITY_IC_AUGP_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
        "pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1059V3a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL6+",
      "ALC_FLR.1",
      "ASE_TSS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1059V3b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "0078f060906be3a123aeb9711f12f3b60c54373663bee71c319a3dbdc14f5ae9",
      "txt_hash": "b2b1b1702cb90cdd6351985f8208a125d0e331db639fdd1cc36d339649b0be17"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "beabfcf46ae26772bc0474f91e18af5e1c0f5a80ee7e0cb572b1acb353abb6fd",
      "txt_hash": "80d9fd4c14d9e3830911e220ab8a0680cb781b53acf97479f466db4fe2db8918"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "93e8c2f4ad9c9647ed408499ce0846c554206140a17f0949ef7d25adbc7e2cd5",
      "txt_hash": "d0595a97c911947f7fface0fce4c18c07822bc5cc974c8ed7eaf30ee70c4920a"
    }
  },
  "status": "active"
}