Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software
BSI-DSZ-CC-0719-2011
NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
BSI-DSZ-CC-0973-2016
name Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
not_valid_before 2011-05-19 2016-06-17
not_valid_after 2019-09-01 2021-06-17
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0719b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973b_pdf.pdf
manufacturer Samsung Electronics Co., Ltd. NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.samsung.com https://www.nxp.com
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0719a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973a_pdf.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2013, 9, 10), 'maintenance_title': 'Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 1 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0719_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0719_ma1b_pdf.pdf'})
state/report/pdf_hash 36850d51a46d0640a93d071e4e783bd7eee1ba0fb5c7271b01b57723b3aeda1b f327a07b7e7805dbefa4e775cfbad546613b87b0c687ab003f78096aba215d09
state/report/txt_hash 48b117ee84c9d160531e0a576e3d052edb07f09e3f0eed1dbc53c90816264072 0990e1b1d79dd65a6b5942a1a73d1112a219b21828cbffa928303745fefa612e
state/st/pdf_hash 2126fa77d32a45fc4b30a967c2d23f920370938a2fede157f95c35ec35cf2dad e42e3f0d502c0e8756f4247901862b82572d9c35c34f32fcf4a5f7820dce1cd9
state/st/txt_hash 8aaa493430efdff36740d04af76ec6bfc6438b20d2e17c2a0ec2a4312eb60a1b e095e8b483dd2ec93de9dfc3e42f048e9bed1de9cbaff5a9c3fe62dbe80b70d8
heuristics/cert_id BSI-DSZ-CC-0719-2011 BSI-DSZ-CC-0973-2016
heuristics/extracted_versions 1.0 5, 2, 1
heuristics/report_references/directly_referenced_by KECS-ISIS-0468-2013, BSI-DSZ-CC-0719-V2-2016, BSI-DSZ-CC-0720-2011 NSCIB-CC-16-99111-CR, NSCIB-CC-16-99111-CR2, ANSSI-CC-2018/10, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2018/09
heuristics/report_references/directly_referencing BSI-DSZ-CC-0639-2010 None
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0801-2012, BSI-DSZ-CC-0882-2013, BSI-DSZ-CC-0720-V2-2016, KECS-ISIS-0468-2013, BSI-DSZ-CC-0720-2011, BSI-DSZ-CC-0719-V2-2016, BSI-DSZ-CC-0802-2012, BSI-DSZ-CC-0882-V2-2019 ANSSI-CC-2020/26, BSI-DSZ-CC-1148-V2-2023, ANSSI-CC-2017/34, ANSSI-CC-2019/43-R01, OCSI/CERT/SYS/03/2018/RC, BSI-DSZ-CC-1147-V2-2023, BSI-DSZ-CC-1059-V2-2019, ANSSI-CC-2020/53-R01, ANSSI-CC-2017/49, ANSSI-CC-2018/10, ANSSI-CC-2020/50-R01, ANSSI-CC-2020/53, ANSSI-CC-2020/51-R01, NSCIB-CC-23-67206-CR, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1118-2020, BSI-DSZ-CC-1121-V2-2021, ANSSI-CC-2017/71, BSI-DSZ-CC-1034-2019, NSCIB-CC-16-99111-CR, ANSSI-CC-2020/50, BSI-DSZ-CC-1059-V3-2019, ANSSI-CC-2019/34, ANSSI-CC-2020/51, BSI-DSZ-CC-1103-2019, ANSSI-CC-2019/50, BSI-DSZ-CC-1065-2020, OCSI/CERT/SYS/09/2016/RC, OCSI/CERT/SYS/04/2018/RC, OCSI/CERT/SYS/10/2016/RC, ANSSI-CC-2019/36, ANSSI-CC-2019/48, ANSSI-CC-2020/36, BSI-DSZ-CC-1147-V3-2023, ANSSI-CC-2017/43, BSI-DSZ-CC-1078-2019, ANSSI-CC-2020/26-R01, ANSSI-CC-2018/06, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2022/33, BSI-DSZ-CC-1148-2020, BSI-DSZ-CC-1059-V5-2022, ANSSI-CC-2020/35, BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1064-2020, ANSSI-CC-2018/15, NSCIB-CC-2200035-01-CR, ANSSI-CC-2018/09, BSI-DSZ-CC-1148-V3-2023, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2018/18, BSI-DSZ-CC-1001-2018, OCSI/CERT/SYS/11/2016/RC, BSI-DSZ-CC-1059-2018, ANSSI-CC-2017/69, ANSSI-CC-2019/43, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1034-V2-2021, BSI-DSZ-CC-1147-2020, ANSSI-CC-2019/35, NSCIB-CC-16-99111-CR2, OCSI/CERT/SYS/02/2018/RC, BSI-DSZ-CC-0996-2018, ANSSI-CC-2017/68, ANSSI-CC-2018/17, ANSSI-CC-2017/72, ANSSI-CC-2019/33, ANSSI-CC-2020/46, BSI-DSZ-CC-0995-2018, ANSSI-CC-2020/48, ANSSI-CC-2020/52-R01, ANSSI-CC-2019/28, ANSSI-CC-2019/47, ANSSI-CC-2019/49, ANSSI-CC-2020/38, ANSSI-CC-2017/70, BSI-DSZ-CC-1059-V4-2021, ANSSI-CC-2018/04, ANSSI-CC-2020/52, ANSSI-CC-2023/38, ANSSI-CC-2018/05, ANSSI-CC-2018/16, BSI-DSZ-CC-1023-2018, ANSSI-CC-2020/47, ANSSI-CC-2018/03, ANSSI-CC-2017/35, BSI-DSZ-CC-1211-2023, NSCIB-CC-98209-CR5, ANSSI-CC-2019/41, ANSSI-CC-2020/37
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0639-2010, BSI-DSZ-CC-0547-2009 None
heuristics/st_references/directly_referenced_by KECS-ISIS-0468-2013 BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1023-2018, ANSSI-CC-2019/32, ANSSI-CC-2018/10, ANSSI-CC-2018/09, ANSSI-CC-2021/57
heuristics/st_references/indirectly_referenced_by KECS-ISIS-0468-2013 BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1023-2018, ANSSI-CC-2019/32, ANSSI-CC-2018/10, ANSSI-CC-2018/09, ANSSI-CC-2021/57
pdf_data/report_filename 0719a_pdf.pdf 0973a_pdf.pdf
pdf_data/report_frontpage/DE
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0719-2011
  • cert_item: Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software
  • developer: Samsung Electronics
  • cert_lab: BSI
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0973-2016
  • cert_item: NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software
  • developer: NXP Semiconductors Germany GmbH
  • cert_lab: BSI
  • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
  • cc_security_level: Common Criteria Part 3 conformant P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 SOGIS Recognition Agreement
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0719-2011 BSI-DSZ-CC-0973-2016
pdf_data/report_frontpage/DE/cert_item Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software
pdf_data/report_frontpage/DE/developer Samsung Electronics NXP Semiconductors Germany GmbH
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0719-2011: 21
  • BSI-DSZ-CC-0639-2010: 3
  • BSI-DSZ-CC-0719: 2
  • BSI-DSZ-CC-0973-2016: 25
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 7
  • R:
    • R.O: 7
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0035-2007: 2
  • BSI-CC-PP- 0035-2007: 1
  • BSI-CC-PP-0084-2014: 4
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.5 2 3
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP.2 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.3 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM.1 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.5 1 2
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 1 3
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 3 5
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 2 3
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 7 9
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 1 3
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 1 6
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 2 3
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 1 3
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 1 9
pdf_data/report_keywords/cc_sar/ATE/ATE_COV.3 1 2
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT.3 2 3
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN 1 2
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN.2 1 2
pdf_data/report_keywords/cc_sar/ATE/ATE_IND 1 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 2 3
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 6 7
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 6
  • EAL 4: 2
  • EAL1: 7
  • EAL4: 7
  • EAL5: 8
  • EAL5+: 1
  • EAL6: 4
  • EAL3: 4
  • EAL7: 4
  • EAL2: 3
  • EAL 5 augmented: 3
  • EAL6: 5
  • EAL 5: 14
  • EAL 2: 7
  • EAL 1: 7
  • EAL 4: 6
  • EAL5: 3
  • EAL 6: 5
  • EAL 5+: 1
  • EAL 3: 4
  • EAL 7: 4
  • EAL6 augmented: 3
  • EAL 5 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 2 6
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 6 14
pdf_data/report_keywords/cc_security_level/EAL/EAL5 8 3
pdf_data/report_keywords/cc_security_level/EAL/EAL6 4 5
pdf_data/report_keywords/cc_sfr
  • FTP:
    • FTP_TRP.1: 2
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • Secure RSA and ECC Library – Project Crow II, Version 1.3, 2011-04-20, Samsung Electronics (confidential document) [7] Evaluation Technical Report Summary (ETR SUMMARY), BSI-DSZ-CC-0719, S3CT9KA / S3CT9K7 : 1
  • Version 1, 2011-04-29, TÃœViT (confidential document) [8] Life Cycle Definition (Class ALC_CMC.4/CMS.5) – Project Crow II, Version 1.0, 2011-03-21: 1
  • Electronics (confidential document) [9] Security Target Lite of S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart: 1
  • Evaluation (ETR-COMP), BSI-DSZ-CC-0719, S3CT9KA / S3CT9K7 / S3CT9K3, Version 1, 2011-04-29, TÃœViT (confidential document) 8 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • 1.11, 2016-06-14, NXP Secure Smart Card Controller P6022y VB Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 2, 2016-06-14, EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
  • TÃœV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • Evaluation (ETR COMP) for the P6022y VB, version 2, 2016-06-14, TÃœV Informationstechnik GmbH (confidential document) [11] Product Data Sheet - SmartMX2 family P6022y VB, Secure high-performance smart card controller: 1
pdf_data/report_keywords/cipher_mode/CBC/CBC 1 11
pdf_data/report_keywords/cipher_mode/ECB/ECB 1 3
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICVersion:
    • IC Version: 1
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 8
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/eval_facility/TUV/TÃœV Informationstechnik 2 4
pdf_data/report_keywords/eval_facility/TUV/TÃœViT 2 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/randomness/RNG/RNG 1 3
pdf_data/report_keywords/randomness/TRNG/TRNG 9 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
    • side-channel: 1
    • DPA: 3
    • SPA: 1
  • FI:
    • physical tampering: 1
    • DFA: 1
  • other:
    • JIL: 4
  • SCA:
    • physical probing: 1
    • SPA: 1
    • DPA: 1
  • other:
    • JIL: 3
pdf_data/report_keywords/side_channel_analysis/SCA
  • physical probing: 1
  • side-channel: 1
  • DPA: 3
  • SPA: 1
  • physical probing: 1
  • SPA: 1
  • DPA: 1
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 3 1
pdf_data/report_keywords/side_channel_analysis/other/JIL 4 3
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS20: 2
    • AIS31: 2
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 36: 2
    • AIS 35: 2
    • AIS 20: 1
    • AIS 32: 1
    • AIS 38: 1
  • NIST:
    • NIST SP 800-67: 3
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 37: 1
    • AIS 31: 2
    • AIS 36: 1
    • AIS31: 1
    • AIS 35: 2
    • AIS 26: 1
    • AIS 32: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 14443: 6
    • ISO/IEC 7816: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS20: 2
  • AIS31: 2
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 2
  • AIS 36: 2
  • AIS 35: 2
  • AIS 20: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 37: 1
  • AIS 31: 2
  • AIS 36: 1
  • AIS31: 1
  • AIS 35: 2
  • AIS 26: 1
  • AIS 32: 1
pdf_data/report_keywords/standard_id/BSI/AIS 26 2 1
pdf_data/report_keywords/standard_id/BSI/AIS 36 2 1
pdf_data/report_keywords/standard_id/BSI/AIS31 2 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 4 16
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 2
  • 3DES: 2
  • TDES: 3
  • Triple-DES: 4
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 2 4
pdf_data/report_keywords/symmetric_crypto/constructions/MAC
  • HMAC: 2
  • CMAC: 5
pdf_data/report_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI 7125: 2
  • BSI 7148: 1
  • BSI TR-02102: 1
  • BSI 7148: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 31
  • NXP:
    • NXP: 26
    • NXP Semiconductors: 36
pdf_data/report_metadata//CreationDate D:20110715095208+02'00' D:20160622114257+02'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Samsung S3CT9KA / S3CT9K7 / S3CT9K3 16-bit RISC Microcontroller for Smart Card, Revision 0 with optional Secure RSA/ECC Library Version 1.0 including specific IC Dedicated Software, Samsung Electronics" "Common Criteria, Certification, Zertifizierung, Smart Card, NXP Semiconductors Germany GmbH, NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software"
pdf_data/report_metadata//ModDate D:20110715095543+02'00' D:20160622115419+02'00'
pdf_data/report_metadata//Producer OpenOffice.org 3.2 LibreOffice 4.2
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0719-2011 Certification Report BSI-DSZ-CC-0973-2016
pdf_data/report_metadata/pdf_file_size_bytes 972498 1426168
pdf_data/report_metadata/pdf_number_of_pages 40 44
pdf_data/st_filename 0719b_pdf.pdf 0973b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA-CRT: 1
  • ECC:
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 15
    • ECC:
      • ECC: 27
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 2
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 9
  • ECDSA:
    • ECDSA: 15
  • ECC:
    • ECC: 27
  • ECC:
    • ECC: 3
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 27 3
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0973: 1
pdf_data/st_keywords/cc_claims/O
  • O.RND: 5
  • O.RND: 3
  • O.TDES: 6
  • O.AES: 6
  • O.CUST_RECONF_PLAIN: 6
  • O.EEPROM_INTEGRITY: 5
  • O.FM_FW: 9
  • O.MEM_ACCESS: 10
  • O.SFR_ACCESS: 9
  • O.PUF: 6
  • O.CUST_RECONF_MIFARE: 6
  • O.ACCESS-CONTROL: 8
  • O.AUTHENTICATION: 7
  • O.ENCRYPTION: 6
  • O.MAC: 6
  • O.TYPE-CONSISTENCY: 4
  • O.DF-TRANSACTION: 4
  • O.TYPE-: 2
  • O.ACCESS-: 1
  • O.DF-: 2
pdf_data/st_keywords/cc_claims/O/O.RND 5 3
pdf_data/st_keywords/cc_claims/T/T.RND 5 2
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 5
  • BSI-PP-0084-2014: 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARV: 1
  • ADV_FSP: 2
  • ADV_IMP: 1
  • ADV_VAN: 1
  • ADV_ARC.1: 7
  • ADV_FSP.5: 3
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
  • ADV_FSP.4: 1
  • ADV_ARC.1: 2
  • ADV_FSP.5: 22
  • ADV_IMP.2: 4
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 1
  • ADV_ARC: 2
  • ADV_FSP: 8
  • ADV_IMP: 2
  • ADV_FSP.4: 6
  • ADV_SPM: 2
  • ADV_IMP.1: 1
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 7 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP 2 8
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 1 6
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 3 22
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP 1 2
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.1 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE 1 2
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE 1 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 7
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_CMS: 2
  • ALC_CMC: 1
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_DVS.1: 1
  • ALC_CMS.4: 1
  • ALC_FLR.1: 6
  • ALC_DVS.2: 5
  • ALC_CMC.5: 4
  • ALC_CMS.5: 10
  • ALC_DEL.1: 2
  • ALC_LCD.1: 2
  • ALC_TAT.3: 1
  • ALC_DEL: 2
  • ALC_DVS: 2
  • ALC_CMS: 8
  • ALC_CMC: 5
  • ALC_CMS.4: 6
  • ALC_CMC.4: 4
  • ALC_TAT.2: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC 1 5
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 1 4
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS 2 8
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 1 6
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 3 10
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL 1 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 1 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS 1 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 7 5
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 1 2
pdf_data/st_keywords/cc_sar/ASE
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
  • ASE_TSS.2: 10
  • ASE_CCL.1: 2
  • ASE_ECD.1: 2
  • ASE_INT.1: 2
  • ASE_OBJ.2: 2
  • ASE_REQ.2: 2
  • ASE_SPD.1: 2
  • ASE_TSS: 2
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 1 2
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 1 2
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 1 2
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 1 2
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 1 2
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 1 2
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV: 1
  • ATE_COV.2: 1
  • ATE_DPT.3: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.3: 4
  • ATE_DPT.3: 2
  • ATE_FUN.2: 1
  • ATE_IND.2: 2
  • ATE_COV: 2
  • ATE_COV.2: 1
  • ATE_FUN.1: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN 1 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 13 7
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 6
  • EAL 4: 1
  • EAL 5: 2
  • EAL5 augmented: 1
  • EAL 4 augmented: 1
  • EAL 5 augmented: 2
  • EAL6: 42
  • EAL5: 38
  • EAL6+: 13
  • EAL5+: 18
  • EAL4: 1
  • EAL4+: 3
  • EAL6 augmented: 4
  • EAL5 augmented: 2
  • EAL4 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 6 38
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 8
    • FAU_GEN: 2
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
    • FAU_GEN.1: 1
  • FCS:
    • FCS_RNG: 11
    • FCS_RNG.1: 19
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
    • FCS_COP.1: 23
    • FCS_COP: 19
    • FCS_CKM.1: 21
    • FCS_CKM.4: 11
    • FCS_CKM: 4
    • FCS_CKM.2: 2
  • FDP:
    • FDP_ACC: 2
    • FDP_ACF: 2
    • FDP_ITT.1: 17
    • FDP_ITT.1.1: 1
    • FDP_ACC.1: 13
    • FDP_IFC.1: 18
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ACF.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 10
    • FDP_ITC.2: 10
    • FDP_SDI.1: 1
    • FDP_IFC: 1
    • FDP_ITT: 1
  • FMT:
    • FMT_LIM: 8
    • FMT_LIM.1: 24
    • FMT_LIM.2: 28
    • FMT_LIM.1.1: 2
    • FMT_LIM.2.1: 2
    • FMT_MSA.3: 10
    • FMT_MSA.1: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 6
    • FMT_MSA.1.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 3
    • FMT_MSA: 2
    • FMT_SMF: 1
  • FPT:
    • FPT_FLS.1: 21
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 20
    • FPT_PHP.3.1: 1
    • FPT_PHP: 3
    • FPT_ITT.1: 15
    • FPT_ITT.1.1: 1
    • FPT_FLS: 1
    • FPT_ITT: 1
  • FRU:
    • FRU_FLT.2: 17
    • FRU_FLT.1: 1
    • FRU_FLT: 1
  • FAU:
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG.1: 8
    • FCS_COP.1: 88
    • FCS_CKM.4: 65
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
    • FCS_CKM.1: 34
    • FCS_COP.1.1: 7
    • FCS_CKM.4.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
  • FDP:
    • FDP_SDC.1: 16
    • FDP_SDI.2: 36
    • FDP_ITT.1: 6
    • FDP_IFC.1: 20
    • FDP_SDI.1: 5
    • FDP_SDI.2.1: 5
    • FDP_SDI.2.2: 5
    • FDP_SDC.1.1: 2
    • FDP_ITC.1: 24
    • FDP_ITC.2: 44
    • FDP_ACC.1: 76
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 58
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_ROL.1: 7
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
  • FIA:
    • FIA_UID.1: 10
    • FIA_UID.2: 17
    • FIA_UAU.2: 15
    • FIA_UAU.1: 2
    • FIA_UAU.5: 13
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 4
    • FMT_MSA.3: 48
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MSA.1: 53
    • FMT_SMR.1: 33
    • FMT_MSA.1.1: 4
    • FMT_SMF.1: 45
    • FMT_SMF.1.1: 3
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_FLS.1: 8
    • FPT_PHP.3: 8
    • FPT_ITT.1: 6
    • FPT_TDC.1: 19
    • FPT_TDC.1.1: 2
    • FPT_TDC.1.2: 2
    • FPT_RPL.1: 16
    • FPT_RPL.1.1: 2
    • FPT_RPL.1.2: 2
  • FRU:
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP.1: 26
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 7
    • FTP_ROL.1: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS: 8
  • FAU_GEN: 2
  • FAU_SAS.1: 12
  • FAU_SAS.1.1: 2
  • FAU_GEN.1: 1
  • FAU_SAS.1: 7
  • FAU_SAS.1.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 12 7
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1.1 2 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 11
  • FCS_RNG.1: 19
  • FCS_RNG.1.1: 2
  • FCS_RNG.1.2: 2
  • FCS_COP.1: 23
  • FCS_COP: 19
  • FCS_CKM.1: 21
  • FCS_CKM.4: 11
  • FCS_CKM: 4
  • FCS_CKM.2: 2
  • FCS_RNG.1: 8
  • FCS_COP.1: 88
  • FCS_CKM.4: 65
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 2
  • FCS_CKM.1: 34
  • FCS_COP.1.1: 7
  • FCS_CKM.4.1: 5
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 21 34
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 11 65
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 23 88
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 19 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 2 3
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 2
  • FDP_ACF: 2
  • FDP_ITT.1: 17
  • FDP_ITT.1.1: 1
  • FDP_ACC.1: 13
  • FDP_IFC.1: 18
  • FDP_IFC.1.1: 1
  • FDP_IFF.1: 3
  • FDP_ACF.1: 9
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 10
  • FDP_ITC.2: 10
  • FDP_SDI.1: 1
  • FDP_IFC: 1
  • FDP_ITT: 1
  • FDP_SDC.1: 16
  • FDP_SDI.2: 36
  • FDP_ITT.1: 6
  • FDP_IFC.1: 20
  • FDP_SDI.1: 5
  • FDP_SDI.2.1: 5
  • FDP_SDI.2.2: 5
  • FDP_SDC.1.1: 2
  • FDP_ITC.1: 24
  • FDP_ITC.2: 44
  • FDP_ACC.1: 76
  • FDP_ACC.1.1: 4
  • FDP_ACF.1: 58
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_ITC.2.1: 2
  • FDP_ITC.2.2: 2
  • FDP_ITC.2.3: 2
  • FDP_ITC.2.4: 2
  • FDP_ITC.2.5: 2
  • FDP_ROL.1: 7
  • FDP_ROL.1.1: 1
  • FDP_ROL.1.2: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 13 76
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 1 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 9 58
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 1 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 1 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 1 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 1 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 18 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 10 24
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 10 44
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 17 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 1 5
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 8
  • FMT_LIM.1: 24
  • FMT_LIM.2: 28
  • FMT_LIM.1.1: 2
  • FMT_LIM.2.1: 2
  • FMT_MSA.3: 10
  • FMT_MSA.1: 9
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMR.1: 6
  • FMT_MSA.1.1: 1
  • FMT_SMF.1: 6
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 3
  • FMT_MSA: 2
  • FMT_SMF: 1
  • FMT_LIM.1: 3
  • FMT_LIM.2: 4
  • FMT_MSA.3: 48
  • FMT_MSA.3.1: 4
  • FMT_MSA.3.2: 4
  • FMT_MSA.1: 53
  • FMT_SMR.1: 33
  • FMT_MSA.1.1: 4
  • FMT_SMF.1: 45
  • FMT_SMF.1.1: 3
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 24 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 28 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 9 53
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 1 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 10 48
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 1 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 1 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 6 45
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 1 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 6 33
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 21
  • FPT_FLS.1.1: 1
  • FPT_PHP.3: 20
  • FPT_PHP.3.1: 1
  • FPT_PHP: 3
  • FPT_ITT.1: 15
  • FPT_ITT.1.1: 1
  • FPT_FLS: 1
  • FPT_ITT: 1
  • FPT_FLS.1: 8
  • FPT_PHP.3: 8
  • FPT_ITT.1: 6
  • FPT_TDC.1: 19
  • FPT_TDC.1.1: 2
  • FPT_TDC.1.2: 2
  • FPT_RPL.1: 16
  • FPT_RPL.1.1: 2
  • FPT_RPL.1.2: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 21 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 15 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 20 8
pdf_data/st_keywords/cc_sfr/FRU
  • FRU_FLT.2: 17
  • FRU_FLT.1: 1
  • FRU_FLT: 1
  • FRU_FLT.2: 8
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 17 8
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 3
  • ECB:
    • ECB: 6
  • CBC:
    • CBC: 13
pdf_data/st_keywords/cipher_mode/ECB/ECB 3 6
pdf_data/st_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 1
  • SmartMX:
    • SmartMX2: 13
    • SmartMX: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 23
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-192: 8
    • P-224: 8
    • P-256: 8
    • P-384: 8
    • secp192k1: 4
    • secp192r1: 4
    • secp224k1: 4
    • secp224r1: 4
    • secp256k1: 4
    • secp256r1: 4
    • secp384r1: 4
  • Brainpool:
    • brainpoolP192r1: 4
    • brainpoolP192t1: 4
    • brainpoolP224r1: 4
    • brainpoolP224t1: 4
    • brainpoolP256r1: 4
    • brainpoolP256t1: 4
    • brainpoolP320r1: 4
    • brainpoolP320t1: 4
    • brainpoolP384r1: 4
    • brainpoolP384t1: 4
    • brainpoolP512r1: 4
    • brainpoolP512t1: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 2
      • SHA-1: 1
    • SHA2:
      • SHA224: 6
      • SHA256: 6
      • SHA384: 6
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
      • SHA512: 2
pdf_data/st_keywords/randomness/RNG/RND 10 5
pdf_data/st_keywords/randomness/RNG/RNG 1 16
pdf_data/st_keywords/randomness/TRNG
  • TRNG: 16
  • DTRNG: 2
  • TRNG: 1
pdf_data/st_keywords/randomness/TRNG/TRNG 16 1
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 21
    • Physical Probing: 4
    • physical probing: 9
    • Physical probing: 2
    • side-channel: 4
    • side channel: 2
    • DPA: 12
    • SPA: 10
    • timing attacks: 1
    • timing attack: 5
  • FI:
    • physical tampering: 2
    • Malfunction: 24
    • malfunction: 11
    • DFA: 4
    • fault injection: 2
  • other:
    • reverse engineering: 5
  • SCA:
    • Leak-Inherent: 11
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 1
    • DPA: 2
    • timing attacks: 2
  • FI:
    • physical tampering: 1
    • Malfunction: 10
    • malfunction: 2
    • fault injection: 2
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 2
  • Malfunction: 24
  • malfunction: 11
  • DFA: 4
  • fault injection: 2
  • physical tampering: 1
  • Malfunction: 10
  • malfunction: 2
  • fault injection: 2
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 24 10
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 11 2
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 2 1
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 21
  • Physical Probing: 4
  • physical probing: 9
  • Physical probing: 2
  • side-channel: 4
  • side channel: 2
  • DPA: 12
  • SPA: 10
  • timing attacks: 1
  • timing attack: 5
  • Leak-Inherent: 11
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 1
  • DPA: 2
  • timing attacks: 2
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 12 2
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 21 11
pdf_data/st_keywords/side_channel_analysis/SCA/Physical Probing 4 2
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing 9 1
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 2 1
pdf_data/st_keywords/side_channel_analysis/SCA/timing attacks 1 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 180-3: 6
    • FIPS 197: 1
  • BSI:
    • AIS20: 3
    • AIS31: 2
    • AIS 20: 1
    • AIS 31: 2
  • CC:
    • CCMB-2009-07-001: 3
    • CCMB-2009-07-002: 3
    • CCMB-2009-07-003: 3
    • CCMB-2009-07-004: 3
  • FIPS:
    • FIPS 197: 5
    • FIPS PUB 197: 3
  • NIST:
    • NIST SP 800-67: 6
    • NIST SP 800-38A: 6
    • NIST SP 800-38B: 2
  • BSI:
    • AIS20: 2
    • AIS31: 4
  • ISO:
    • ISO/IEC 7816: 28
    • ISO/IEC 14443: 24
    • ISO/IEC 9797-1: 1
    • ISO/IEC 18092: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/st_keywords/standard_id/BSI
  • AIS20: 3
  • AIS31: 2
  • AIS 20: 1
  • AIS 31: 2
  • AIS20: 2
  • AIS31: 4
pdf_data/st_keywords/standard_id/BSI/AIS20 3 2
pdf_data/st_keywords/standard_id/BSI/AIS31 2 4
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 3
  • CCMB-2009-07-002: 3
  • CCMB-2009-07-003: 3
  • CCMB-2009-07-004: 3
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 180-3: 6
  • FIPS 197: 1
  • FIPS 197: 5
  • FIPS PUB 197: 3
pdf_data/st_keywords/standard_id/FIPS/FIPS 197 1 5
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 14 121
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3DES: 6
  • Triple-DES: 1
  • TDEA: 1
  • Triple-DES: 30
  • TDES: 54
  • TDEA: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 1 30
pdf_data/st_keywords/symmetric_crypto/DES/DES
  • DES: 9
  • DES: 6
  • DEA: 1
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 9 6
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • HMAC: 2
  • CBC-MAC: 2
  • CMAC: 9
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 3
  • NXP:
    • NXP: 180
    • NXP Semiconductors: 47
    • NXP Semiconductors N.V: 129
pdf_data/st_metadata
  • pdf_file_size_bytes: 753587
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 67
  • /Author: SungGeun Park
  • /CreationDate: D:20110516173531+09'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /Keywords: Security Target of S3CT9KA/K7/K3 16-bit Secure RISC Microcontroller For Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software, CC EAL5+, Samsung Electroncis, SmartCard IC, Common Criteria version 3.1
  • /ModDate: D:20110516174952+09'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Subject: S3CT9KA/K7/K3 Common Criteria(version 3.1) EAL5+ Evaluation
  • /Title: Security Target Lite of S3CT9KA/K7/K3 16-bit RISC Microcontroller For Smart Cards
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 824420
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 129
  • /Author: NXP Semiconductors
  • /CreationDate: D:20160614165343+02'00'
  • /Creator: DITA Open Toolkit
  • /Keywords: CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB
  • /ModDate: D:20160614165719+02'00'
  • /PDFVersion: 1.4
  • /Producer: Apache FOP Version 1.1
  • /Subject: NXP Secure Smart Card Controller P6022y VB
  • /Title: Security Target Lite
  • pdf_hyperlinks:
pdf_data/st_metadata//Author SungGeun Park NXP Semiconductors
pdf_data/st_metadata//CreationDate D:20110516173531+09'00' D:20160614165343+02'00'
pdf_data/st_metadata//Creator PScript5.dll Version 5.2.2 DITA Open Toolkit
pdf_data/st_metadata//Keywords Security Target of S3CT9KA/K7/K3 16-bit Secure RISC Microcontroller For Smart Card with optional Secure RSA and ECC Library including specific IC Dedicated Software, CC EAL5+, Samsung Electroncis, SmartCard IC, Common Criteria version 3.1 CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB
pdf_data/st_metadata//ModDate D:20110516174952+09'00' D:20160614165719+02'00'
pdf_data/st_metadata//Producer Acrobat Distiller 9.0.0 (Windows) Apache FOP Version 1.1
pdf_data/st_metadata//Subject S3CT9KA/K7/K3 Common Criteria(version 3.1) EAL5+ Evaluation NXP Secure Smart Card Controller P6022y VB
pdf_data/st_metadata//Title Security Target Lite of S3CT9KA/K7/K3 16-bit RISC Microcontroller For Smart Cards Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 753587 824420
pdf_data/st_metadata/pdf_number_of_pages 67 129
dgst 200fa846782ecbb5 6ca6e73099dff023