Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Palo Alto Networks PA-220 Series, PA-400 Series, PA-800 Series, PA-3200 Series, PA-5200 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 10.1
CCEVS-VR-VID-11284-2022
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software
BSI-DSZ-CC-1059-V5-2022
name Palo Alto Networks PA-220 Series, PA-400 Series, PA-800 Series, PA-3200 Series, PA-5200 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 10.1 NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US DE
status archived active
not_valid_after 13.09.2024 12.12.2027
not_valid_before 31.08.2022 12.12.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11284-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1059V5c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11284-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1059V5a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11284-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1059V5b_pdf.pdf
manufacturer Palo Alto Networks, Inc. NXP Semiconductors Germany GmbH
manufacturer_web https://www.paloaltonetworks.com/ https://www.nxp.com
security_level {} EAL6+, ALC_FLR.1, ASE_TSS.2
dgst 150bf4f0cdc34e0e 8cc4b54348148bbe
heuristics/cert_id CCEVS-VR-VID-11284-2022 BSI-DSZ-CC-1059-V5-2022
heuristics/cert_lab US BSI
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 10.1 -
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2020/53-R01, NSCIB-CC-23-67206-CR, ANSSI-CC-2020/50-R01, ANSSI-CC-2020/51-R01, ANSSI-CC-2020/26-R01, NSCIB-CC-2200035-01-CR, ANSSI-CC-2020/52-R01
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1059-V4-2021
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2020/53-R01, NSCIB-CC-23-67206-CR, ANSSI-CC-2020/50-R01, ANSSI-CC-2020/51-R01, ANSSI-CC-2020/26-R01, NSCIB-CC-2200035-01-CR, ANSSI-CC-2023/38, ANSSI-CC-2020/52-R01
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1059-V4-2021, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1059-V2-2019
heuristics/scheme_data
  • category: Firewall, Network Device, Traffic Monitoring, Virtual Private Network
  • certification_date: 31.08.2022
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 13.09.2024
  • id: CCEVS-VR-VID11284
  • product: Palo Alto Networks PA-220 Series, PA-400 Series, PA-800 Series, PA-3200 Series, PA-5200 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 10.1
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11284
  • vendor: Palo Alto Networks, Inc.
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2023/38, ANSSI-CC-2020/26-R01
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2023/38, ANSSI-CC-2020/26-R01
heuristics/protection_profiles a4784f14919bdbe6, 89f2a255423f4a20 cf0f01bcd7be3e9c
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CFG_NDcPP-VPNGW_V1.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename st_vid11284-ci.pdf 1059V5c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11284-2022: 1
  • DE:
    • BSI-DSZ-CC-1059-V5-2022: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 5: 1
    • EAL 6: 1
    • EAL 6 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
  • ASE:
    • ASE_TSS.2: 1
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP: 1
    • NXP Semiconductors: 1
pdf_data/cert_keywords/eval_facility
  • Leidos:
    • Leidos: 1
pdf_data/cert_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20220906175610-04'00'
  • /ModDate: D:20220906175610-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 182730
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software, NXP Semiconductors Germany GmbH"
  • /Subject: Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software, NXP Semiconductors Germany GmbH
  • /Title: Certificate BSI-DSZ-CC-1059-V5-2022
  • pdf_file_size_bytes: 230975
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11284-vr.pdf 1059V5a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID11284-2022
    • cert_item: for Palo Alto Networks PA-220 Series, PA-400 Series, PA- 800 Series, PA-3200 Series, PA-5200 Series, PA-5450, PA-7000 Series, and VM Series Next-Generation Firewall with PAN-OS 10.1
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1059-V5-2022
    • cert_item: NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11284-2022: 1
  • DE:
    • BSI-DSZ-CC-1059-V4-2021: 2
    • BSI-DSZ-CC-1059-V5-2022: 19
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 1
    • EAL 5: 4
    • EAL 5+: 1
    • EAL 6: 5
    • EAL 6 augmented: 3
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_VAN: 1
  • ALC:
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_TSS.2: 4
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_TLSC_EXT.2.3: 1
  • FIA:
    • FIA_AFL.1: 2
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 5
  • R:
    • R.O: 5
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 4
  • NXP:
    • NXP: 40
    • NXP Semiconductors: 30
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 7
  • TUV:
    • TÜV Informationstechnik: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 1
      • Triple-DES: 5
    • DES:
      • DES: 2
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 3
  • IPsec:
    • IPsec: 46
  • SSH:
    • SSH: 13
    • SSHv2: 2
  • TLS:
    • SSL:
      • SSL: 3
    • TLS:
      • TLS: 16
  • VPN:
    • VPN: 64
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 3
  • TRNG:
    • TRNG: 2
pdf_data/report_keywords/cipher_mode
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 7
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 10
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • RFC:
    • RFC 5077: 1
  • BSI:
    • AIS 1: 1
    • AIS 25: 2
    • AIS 26: 1
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 2
    • AIS 37: 1
    • AIS 38: 1
    • AIS 39: 1
    • AIS 46: 1
    • AIS 47: 1
    • AIS31: 2
  • FIPS:
    • FIPS197: 4
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 7816: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 2018-11-27, NXP Semiconductors (confidential document) 7 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
    • 3.7, 2017-05-15, NXP Semiconductors (confidential document) [16] Objective Data Sheet Addendum - SmartMX2 P602xy VB Family Firmware Interface Specification: 1
    • COMP) for the P6022y VB, BSI-DSZ-CC-1059-V5, version 1, 2022-10-24, TÜV Informationstechnik GmbH (confidential document) [11] Product Data Sheet - SmartMX2 family P6022y VB, Secure high-performance smart card controller: 1
    • GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • NXP Semiconductors (confidential document) [13] Information on Guidance and Operation, NXP Secure Smart Card Controller P6022y VB, Version 1: 1
    • NXP Semiconductors (confidential document) [20] Site Technical Audit Report (STAR), Firma C. Weber, Leiterplattenverarbeitung, Version 1: 1
    • P6022y VB Configuration List - Hardware IC, Version 1.6, 2019-08-09, NXP Semiconductors (confidential document) [19] NXP Secure Smart Card Controller P6022y VB Evaluation Reference List, Version 2.8, 2021-05-04: 1
    • Smart Card Controller P6022y VB – Security Target, Version 2.8, 2021-03-09, NXP Semiconductors (confidential document) [7] Evaluation Technical Report BSI-DSZ-CC-1059-V5-2022, Version 1, 2022-10-24, TÜV: 1
    • SmartMX2 P6022y VB, Wafer and delivery specification, Version 3.3, 2019-07-12, NXP Semiconductors (confidential document) [15] Product data sheet addendum - SmartMX2 P602xy VB family, Firmware Interface Specification: 1
    • Version 1.1, 2016-05-23, NXP Semiconductors (confidential document) [17] Order Entry Form, Version 2.1, 2019-11-18, NXP Semiconductors [18] NXP Secure Smart Card: 1
    • Version 3.6, 2019-08-22, NXP Semiconductors (confidential document) [12] Instruction Set for the SmartMX2 family, Secure smart card controller, Version 3.1: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /CreationDate: D:20220906174944-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220906174944-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 831523
  • pdf_hyperlinks: http://www.niap-ccevs.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
pdf_data/st_filename st_vid11284-st.pdf 1059V5b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1059: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-2014: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL4+: 2
    • EAL6: 44
    • EAL6 augmented: 5
    • EAL6+: 11
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.1: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 3
    • ADV_FSP.4: 3
    • ADV_FSP.5: 11
    • ADV_IMP: 1
    • ADV_IMP.2: 3
    • ADV_INT.3: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 3
    • ALC_CMC.4: 3
    • ALC_CMC.5: 4
    • ALC_CMS: 3
    • ALC_CMS.4: 3
    • ALC_CMS.5: 5
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 1
    • ALC_FLR.1: 6
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 3
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 5
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT: 1
    • FAU_STG_EXT.1: 3
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 9
    • FCS_CKM.1: 4
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 7
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 3
    • FCS_CKM.4.1: 1
    • FCS_COP: 14
    • FCS_COP.1: 4
    • FCS_NTP_EXT.1: 1
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 5
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHS_EXT: 1
    • FCS_SSHS_EXT.1: 3
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 2
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT: 2
    • FCS_TLSC_EXT.1: 3
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.2.3: 1
    • FCS_TLSS_EXT: 2
    • FCS_TLSS_EXT.1: 4
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.1.4: 1
    • FCS_TLSS_EXT.2: 2
    • FCS_TLSS_EXT.2.1: 1
    • FCS_TLSS_EXT.2.2: 1
    • FCS_TLSS_EXT.2.3: 1
  • FDP:
    • FDP_RIP: 1
    • FDP_RIP.2: 4
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT: 1
    • FIA_PMG_EXT.1: 3
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 1
    • FIA_UAU_EXT.2: 2
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 1
    • FIA_UIA_EXT.1: 5
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 8
    • FMT_MOF.1: 2
    • FMT_MTD: 8
    • FMT_MTD.1: 2
    • FMT_SMF: 8
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 2
    • FMT_SMR: 1
    • FMT_SMR.2: 3
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 1
    • FPT_APW_EXT.1: 3
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_FLS: 3
    • FPT_FLS.1: 1
    • FPT_SKP_EXT: 1
    • FPT_SKP_EXT.1: 3
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT: 1
    • FPT_STM_EXT.1: 4
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 2
    • FPT_TST_EXT: 3
    • FPT_TST_EXT.1: 3
    • FPT_TST_EXT.1.1: 1
    • FPT_TST_EXT.3: 2
    • FPT_TST_EXT.3.1: 1
    • FPT_TST_EXT.3.2: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 3
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL: 2
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 2
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT: 1
    • FTA_SSL_EXT.1: 3
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 1
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC: 4
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 4
    • FTP_TRP.1: 3
  • FAU:
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 44
    • FCS_CKM.4.1: 3
    • FCS_COP.1: 42
    • FCS_COP.1.1: 4
    • FCS_RNG.1: 8
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 35
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 32
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 10
    • FDP_ITC.1: 14
    • FDP_ITC.2: 14
    • FDP_ITT.1: 6
    • FDP_SDC.1: 16
    • FDP_SDC.1.1: 2
    • FDP_SDI.1: 5
    • FDP_SDI.2: 36
    • FDP_SDI.2.1: 5
    • FDP_SDI.2.2: 5
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 4
    • FMT_MSA.1: 26
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 5
  • FPT:
    • FPT_FLS.1: 8
    • FPT_ITT.1: 6
    • FPT_PHP.3: 8
  • FRU:
    • FRU_FLT.2: 8
pdf_data/st_keywords/cc_claims
  • A:
    • A.COMPONENTS_RUNNING: 1
    • A.PHYSICAL_PROTECTION: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.COMPONENTS_RUNNING: 1
    • OE.CONNECTIONS: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
    • OE.VM_CONFIGURATION: 1
  • O:
    • O.AES: 7
    • O.CUST_RECONF_PLAIN: 6
    • O.E: 1
    • O.EEPROM_INTEGRITY: 4
    • O.F: 1
    • O.FM_FW: 8
    • O.MEM_ACCESS: 10
    • O.PUF: 6
    • O.RND: 3
    • O.SFR_: 1
    • O.SFR_ACCESS: 8
    • O.TDES: 7
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 3
  • Microsoft:
    • Microsoft: 5
  • NXP:
    • NXP: 204
    • NXP Semiconductors: 140
    • NXP Semiconductors N.V: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 35
      • AES-: 2
      • AES-256: 5
  • DES:
    • 3DES:
      • 3DES: 1
  • constructions:
    • MAC:
      • HMAC: 13
      • HMAC-SHA-256: 7
      • HMAC-SHA-384: 4
      • HMAC-SHA-512: 6
  • AES_competition:
    • AES:
      • AES: 81
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 45
      • Triple-DES: 19
    • DES:
      • DEA: 1
      • DES: 8
  • constructions:
    • MAC:
      • CBC-MAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 7
    • ECDH:
      • ECDH: 2
      • ECDHE: 6
    • ECDSA:
      • ECDSA: 26
  • FF:
    • DH:
      • DH: 32
      • DHE: 3
      • Diffie-Hellman: 8
    • DSA:
      • DSA: 2
  • RSA:
    • RSA 2048: 1
    • RSA-2048: 1
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 8
      • SHA-384: 6
      • SHA-512: 4
      • SHA256: 4
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 3
  • MAC:
    • MAC: 4
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 30
    • IKEv1: 15
    • IKEv2: 13
  • IPsec:
    • IPsec: 104
  • SSH:
    • SSH: 59
    • SSHv2: 7
  • TLS:
    • DTLS:
      • DTLS: 1
    • SSL:
      • SSL: 6
      • SSL 2.0: 3
      • SSL 3.0: 3
    • TLS:
      • TLS: 90
      • TLS 1.0: 3
      • TLS 1.1: 3
      • TLS 1.2: 4
      • TLSv1.1: 2
      • TLSv1.2: 6
  • VPN:
    • VPN: 90
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 15
  • RNG:
    • RBG: 2
  • RNG:
    • RND: 5
    • RNG: 14
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 13
  • CCM:
    • CCM: 5
  • CTR:
    • CTR: 7
  • GCM:
    • GCM: 16
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 6
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 24
    • P-384: 18
    • P-521: 10
    • secp256r1: 5
    • secp384r1: 4
    • secp521r1: 3
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 1
    • SmartMX2: 13
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 4
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 4
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 4
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 4
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 10
    • fault injection: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 11
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 1
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 186-4: 4
    • FIPS PUB 186-4: 20
  • ISO:
    • ISO/IEC 14888-3: 2
    • ISO/IEC 18031:2011: 5
    • ISO/IEC 9796-2: 2
  • NIST:
    • NIST SP 800-56A: 2
    • SP 800-135: 2
    • SP 800-90A: 2
  • PKCS:
    • PKCS #1: 2
    • PKCS#12: 2
  • RFC:
    • RFC 2460: 2
    • RFC 2818: 3
    • RFC 2986: 2
    • RFC 3268: 8
    • RFC 3447: 2
    • RFC 3513: 2
    • RFC 3526: 11
    • RFC 35269: 1
    • RFC 3602: 3
    • RFC 3986: 2
    • RFC 4106: 1
    • RFC 4109: 1
    • RFC 4253: 1
    • RFC 4301: 2
    • RFC 4303: 2
    • RFC 4304: 1
    • RFC 4346: 3
    • RFC 4443: 1
    • RFC 4492: 12
    • RFC 4868: 1
    • RFC 4945: 1
    • RFC 5077: 3
    • RFC 5114: 2
    • RFC 5246: 8
    • RFC 5280: 4
    • RFC 5289: 28
    • RFC 5735: 2
    • RFC 5759: 1
    • RFC 5996: 3
    • RFC 6125: 4
    • RFC 6598: 2
    • RFC 6960: 1
    • RFC 768: 2
    • RFC 791: 2
    • RFC 7919: 1
    • RFC 792: 1
    • RFC 793: 3
    • RFC 959: 1
    • RFC2409: 1
    • RFC4945: 1
  • X509:
    • X.509: 13
  • BSI:
    • AIS31: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 197: 3
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 14443: 20
    • ISO/IEC 7816: 28
    • ISO/IEC 9797-1: 1
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-67: 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • and URL Filtering security policies/profiles are not evaluated and therefore, these features are out of scope. API request over HTTP By default, the TOE supports API requests over HTTPS or HTTPS tunneled over: 1
    • Policies The TLS and SSH decryption policies are not evaluated and therefore, these features are out of scope. Anti-Virus, Anti-Spyware, Anti- Malware Security Policies The Anti-Virus, Anti-Spyware: 1
    • functional requirements: TLS, HTTPS, SSH, IKE/IPsec. The features below and Normal mode are out of scope. Table 2 Excluded Features Feature Description Telnet and HTTP Management Protocols Telnet and HTTP: 1
    • is secured with TLS using FIPS-approved algorithms. The threat prevention signatures themselves are out of scope (i.e., not evaluated). Page 12 of 84 Management The next-generation firewall provides both direct: 1
    • malformed, fragmented packets. The protection from viruses, worm, and spyware using signatures are out of scope (i.e., not evaluated). • DoS Protection – the firewall is designed to protect against flooding: 1
    • out of scope: 6
    • security policies (i.e., profiles) are not evaluated and therefore, there features are out of scope. File Blocking, DLP, and URL Filtering Security Policies The File Blocking, DLP (Data Loss: 1
pdf_data/st_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: CC, Security Target, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB
  • /Subject: NXP Secure Smart Card Controller P6022y VB
  • /Title: Security Target
  • pdf_file_size_bytes: 1313917
  • pdf_hyperlinks: http://www.nxp.com/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 99
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different