This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0a and P5CC012V0A each with IC Dedicated Software: Secured Crypto Library Release 2.0 to CC EAL5+ BSI-DSZ-CC-0464-2008 |
Infineon Security Controller, M7892 Design Steps D11 and G12, with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries, symmetric crypto library v2.02.010 and with specific IC dedicated software (firmware) BSI-DSZ-CC-0891-V2-2016 |
|
---|---|---|
name | NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0a and P5CC012V0A each with IC Dedicated Software: Secured Crypto Library Release 2.0 to CC EAL5+ | Infineon Security Controller, M7892 Design Steps D11 and G12, with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries, symmetric crypto library v2.02.010 and with specific IC dedicated software (firmware) |
not_valid_before | 2008-06-13 | 2016-12-20 |
not_valid_after | 2019-09-01 | 2021-12-20 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0464b.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V2b_pdf.pdf |
manufacturer | NXP Semiconductors | Infineon Technologies AG |
manufacturer_web | https://www.nxp.com/ | https://www.infineon.com/ |
security_level | EAL5+, ALC_DVS.2, AVA_VLA.4, AVA_MSU.3 | ALC_FLR.1, EAL6+ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0464a.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V2a_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) | |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2013, 12, 19), 'maintenance_title': 'NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A and P5CC012V0A each with specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0464_ma3a_pdf.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2012, 7, 31), 'maintenance_title': 'NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A and P5CC012V0A each with specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0464_ma2a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0464_ma2b_pdf.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 9, 2), 'maintenance_title': 'NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A and P5CC012V0A each with specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0464_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0464_ma1b_pdf.pdf'}) | |
state/report/pdf_hash | 7516c0777a20694cb3de12613c30ac8059632339ea5a91eb574d9a8ded914371 | 9945b7d3b0356021c38fe5dfaef23ccfce0945fc223844d48c2455403dd38b46 |
state/report/txt_hash | 303fcef7fa985cb4a78e587576b8d210902b8c9c5fc1933b978b5a64c3538642 | e71b9a66aba5412d0aacae08c557832a5d5d07839c9b3f6c6e91884f740d9dc2 |
state/st/pdf_hash | 2976f748c1f8e27d3c9d5690683e2fe62a59445b13ca5634f666fa61bc3076c8 | 1d498c6b156e29079aac67c4a0bc56ccaddb460cc34d2182c0da4d8045536909 |
state/st/txt_hash | e0eb3bf798fa35e566afa81fead858d314d22ae3656fa87de074c82cf391d3e0 | eec8796b0551a13865067fb4f58b363a9efb36ba8787c8b9780ed664098850d4 |
heuristics/cert_id | BSI-DSZ-CC-0464-2008 | BSI-DSZ-CC-0891-V2-2016 |
heuristics/extracted_versions | 2.0 | 1.01, 2.02.010, 2.03.008 |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-0549-2008 | BSI-DSZ-CC-0980-2017, BSI-DSZ-CC-1003-2018, ANSSI-CC-2017/76, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0961-V2-2018, ANSSI-CC-2017/21, ANSSI-CC-2018/21, ANSSI-CC-2017/82, ANSSI-CC-2017/19, ANSSI-CC-2017/07, ANSSI-CC-2017/20, ANSSI-CC-2017/83, BSI-DSZ-CC-0891-V3-2018, ANSSI-CC-2017/81, ANSSI-CC-2017/22, NSCIB-CC-16-95781-CR, ANSSI-CC-2017/54, ANSSI-CC-2018/11, ANSSI-CC-2018/24 |
heuristics/report_references/directly_referencing | None | BSI-DSZ-CC-0891-2015 |
heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-0549-2008 | BSI-DSZ-CC-0980-2017, BSI-DSZ-CC-1148-V2-2023, ANSSI-CC-2020/56, ANSSI-CC-2020/07, NSCIB-CC-22-0286910-CR, BSI-DSZ-CC-1147-V2-2023, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0961-V2-2018, ANSSI-CC-2022/20, ANSSI-CC-2017/82, BSI-DSZ-CC-1110-V5-2022, NSCIB-CC-0075541-CR2, ANSSI-CC-2019/57-R01, BSI-DSZ-CC-1036-2019, ANSSI-CC-2020/64, ANSSI-CC-2020/61, BSI-DSZ-CC-1162-V2-2023, BSI-DSZ-CC-1034-2019, ANSSI-CC-2017/83, ANSSI-CC-2022/65, ANSSI-CC-2018/57v2, ANSSI-CC-2017/22, ANSSI-CC-2019/55, 2018-20-INF-4155, ANSSI-CC-2019/58, ANSSI-CC-2017/54, 2017-19-INF-3171, ANSSI-CC-2018/24, ANSSI-CC-2020/60, 2017-17-INF-3169, BSI-DSZ-CC-1003-2018, ANSSI-CC-2020/88-R01, BSI-DSZ-CC-0976-V3-2019, BSI-DSZ-CC-1077-V2-2024, BSI-DSZ-CC-1077-2020, NSCIB-CC-146301-CR2, JISEC-CC-CRP-C0648-01-2019, ANSSI-CC-2019/09, NSCIB-CC-175887-CR3, BSI-DSZ-CC-1172-2022, ANSSI-CC-2019/31, NSCIB-CC-0299278-CR, BSI-DSZ-CC-1147-V3-2023, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2018/21, ANSSI-CC-2020/57, ANSSI-CC-2022/67, ANSSI-CC-2022/33, BSI-DSZ-CC-1148-2020, BSI-DSZ-CC-1055-2018, BSI-DSZ-CC-1176-2023, ANSSI-CC-2020/59, BSI-DSZ-CC-0891-V3-2018, KECS-ISIS-1031-2020, NSCIB-CC-0112113-CR, ANSSI-CC-2020/62, NSCIB-CC-0299277-CR, ANSSI-CC-2020/49, ANSSI-CC-2018/32v2, BSI-DSZ-CC-0961-V6-2022, ANSSI-CC-2022/08, BSI-DSZ-CC-0891-V5-2021, ANSSI-CC-2018/58v2, BSI-DSZ-CC-1098-2020, ANSSI-CC-2018/32, ANSSI-CC-2020/63, ANSSI-CC-2017/76, BSI-DSZ-CC-1148-V3-2023, ANSSI-CC-2020/43, ANSSI-CC-2018/53, ANSSI-CC-2020/55, ANSSI-CC-2020/44, ANSSI-CC-2020/08, ANSSI-CC-2020/33, BSI-DSZ-CC-0891-V6-2021, NSCIB-CC-0286907-CR, BSI-DSZ-CC-0891-V7-2024, BSI-DSZ-CC-1162-2021, BSI-DSZ-CC-1110-V6-2023, BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-1110-V3-2020, ANSSI-CC-2017/19, BSI-DSZ-CC-0976-V4-2021, ANSSI-CC-2017/07, BSI-DSZ-CC-1076-2020, ANSSI-CC-2022/68, ANSSI-CC-2017/20, ANSSI-CC-2019/58-R01, ANSSI-CC-2018/56v2, BSI-DSZ-CC-1034-V2-2021, ANSSI-CC-2020/87-R01, BSI-DSZ-CC-1147-2020, ANSSI-CC-2020/45, BSI-DSZ-CC-0961-V4-2019, BSI-DSZ-CC-1243-2024, ANSSI-CC-2019/07, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2022/07, ANSSI-CC-2022/64, NSCIB-CC-16-95781-CR, BSI-DSZ-CC-0976-V2-2018, ANSSI-CC-2018/11, ANSSI-CC-2022/19, ANSSI-CC-2019/56, BSI-DSZ-CC-0869-V2-2019, ANSSI-CC-2018/57, ANSSI-CC-2020/42, ANSSI-CC-2019/56-R01, 2021-43-INF-4154, ANSSI-CC-2018/58, 2021-44-INF-4142, ANSSI-CC-2019/55-R01, BSI-DSZ-CC-0891-V4-2019, ANSSI-CC-2019/57, ANSSI-CC-2017/21, BSI-DSZ-CC-1112-V2-2021, 2017-18-INF-3170, BSI-DSZ-CC-1117-2019, ANSSI-CC-2018/56, BSI-DSZ-CC-0961-V5-2020, ANSSI-CC-2020/87, ANSSI-CC-2020/88, ANSSI-CC-2020/58, BSI-DSZ-CC-1112-2020, ANSSI-CC-2017/81, BSI-DSZ-CC-0961-V3-2018, JISEC-CC-CRP-C0649-01-2019, BSI-DSZ-CC-1211-2023 |
heuristics/report_references/indirectly_referencing | None | BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012 |
heuristics/st_references/directly_referenced_by | None | BSI-DSZ-CC-1003-2018, ANSSI-CC-2017/76, 2016-32-INF-2110, ANSSI-CC-2017/21, ANSSI-CC-2020/33, ANSSI-CC-2018/21, ANSSI-CC-2017/82, ANSSI-CC-2017/19, ANSSI-CC-2017/07, ANSSI-CC-2017/20, ANSSI-CC-2017/83, 2016-31-INF-2102, BSI-DSZ-CC-0891-V3-2018, ANSSI-CC-2017/81, ANSSI-CC-2017/22, 2016-30-INF-2094, NSCIB-CC-16-95781-CR, ANSSI-CC-2017/54, ANSSI-CC-2018/11, ANSSI-CC-2018/24 |
heuristics/st_references/indirectly_referenced_by | None | 2017-17-INF-3169, BSI-DSZ-CC-1003-2018, BSI-DSZ-CC-0869-V2-2019, ANSSI-CC-2020/42, NSCIB-CC-146301-CR2, ANSSI-CC-2017/76, ANSSI-CC-2020/43, 2016-32-INF-2110, ANSSI-CC-2019/09, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-1000-2023, ANSSI-CC-2017/21, ANSSI-CC-2020/44, ANSSI-CC-2020/33, BSI-DSZ-CC-1112-V2-2021, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2018/21, 2017-18-INF-3170, ANSSI-CC-2017/82, ANSSI-CC-2017/19, BSI-DSZ-CC-1036-2019, ANSSI-CC-2017/07, ANSSI-CC-2017/20, BSI-DSZ-CC-1034-2019, ANSSI-CC-2017/83, 2016-31-INF-2102, BSI-DSZ-CC-1034-V2-2021, ANSSI-CC-2020/45, 2017-19-INF-3171, BSI-DSZ-CC-1112-2020, OCSI/CERT/CCL/14/2022/RC, BSI-DSZ-CC-0891-V3-2018, ANSSI-CC-2017/81, ANSSI-CC-2017/22, NSCIB-CC-0112113-CR, BSI-DSZ-CC-1105-2020, ANSSI-CC-2020/49, 2016-30-INF-2094, NSCIB-CC-16-95781-CR, ANSSI-CC-2017/54, ANSSI-CC-2018/11, ANSSI-CC-2018/24 |
pdf_data/report_filename | 0464a.pdf | 0891V2a_pdf.pdf |
pdf_data/report_frontpage/DE |
|
|
pdf_data/report_frontpage/DE/cert_id | BSI-DSZ-CC-0464-2008 | BSI-DSZ-CC-0891-V2-2016 |
pdf_data/report_frontpage/DE/cert_item | NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A and P5CC012V0A each with specific IC Dedicated Software | Infineon Security Controller, M7892 Design Steps D11 and G12, with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries, symmetric crypto library v2.02.010 and with specific IC dedicated software (firmware |
pdf_data/report_frontpage/DE/developer | NXP Semiconductors Germany GmbH | Infineon Technologies AG |
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP | 2 | 1 |
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP | 2 | 1 |
pdf_data/report_keywords/cc_sar/ADV/ADV_INT | 2 | 1 |
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM | 2 | 1 |
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 6 | 3 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 2 | 3 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 | 1 | 2 |
pdf_data/report_keywords/cc_sar/APE |
|
|
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/ATE/ATE_COV | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_IND | 2 | 1 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 | 1 | 7 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 | 5 | 9 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 4 | 10 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 | 1 | 4 |
pdf_data/report_keywords/cc_security_level/EAL/EAL6 | 3 | 1 |
pdf_data/report_keywords/certification_process/ConfidentialDocument |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/eval_facility | |
|
pdf_data/report_keywords/hash_function | |
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/RNG/RNG | 4 | 1 |
pdf_data/report_keywords/randomness/TRNG/TRNG | 1 | 2 |
pdf_data/report_keywords/side_channel_analysis/FI |
|
|
pdf_data/report_keywords/side_channel_analysis/SCA |
|
|
pdf_data/report_keywords/side_channel_analysis/SCA/DPA | 1 | 3 |
pdf_data/report_keywords/side_channel_analysis/SCA/SPA | 1 | 3 |
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 25 | 3 | 2 |
pdf_data/report_keywords/standard_id/BSI/AIS 31 | 3 | 2 |
pdf_data/report_keywords/standard_id/BSI/AIS 34 | 3 | 2 |
pdf_data/report_keywords/standard_id/BSI/AIS 35 | 3 | 2 |
pdf_data/report_keywords/standard_id/BSI/AIS 36 | 2 | 3 |
pdf_data/report_keywords/standard_id/ISO |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 1 | 5 |
pdf_data/report_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES | 5 | 2 |
pdf_data/report_keywords/symmetric_crypto/DES/DES |
|
|
pdf_data/report_keywords/technical_report_id/BSI |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vendor/Infineon |
|
|
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG | 1 | 20 |
pdf_data/report_metadata//CreationDate | D:20080702073648+02'00' | D:20170112112116+01'00' |
pdf_data/report_metadata//Keywords | "NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A and P5CC012V0A each with specific IC Dedicated Software, NXP Semiconductors Germany GmbH, BSI-DSZ-CC-0464-2008" | "Common Criteria, Certification, Zertifizierung, PP-0084, Sicherheits IC, Security IC, SmartCard" |
pdf_data/report_metadata//ModDate | D:20080702081744+02'00' | D:20170116131102+01'00' |
pdf_data/report_metadata//Producer | OpenOffice.org 2.4 | LibreOffice 4.2 |
pdf_data/report_metadata//Subject | Common Criteria Zertifizierung | Common Criteria Certification |
pdf_data/report_metadata//Title | Zertifizierungsreport BSI-DSZ-CC-0464-2008 | Certification Report BSI-DSZ-CC-0891-V2-2016 |
pdf_data/report_metadata/pdf_file_size_bytes | 566888 | 1274003 |
pdf_data/report_metadata/pdf_hyperlinks | http://www.bsi.bund.de/ | https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte |
pdf_data/report_metadata/pdf_number_of_pages | 38 | 42 |
pdf_data/st_filename | 0464b.pdf | 0891V2b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 1 | 19 |
pdf_data/st_keywords/cc_cert_id/DE |
|
|
pdf_data/st_keywords/cc_claims/O |
|
|
pdf_data/st_keywords/cc_claims/T/T.RND | 2 | 1 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 4 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 | 1 | 2 |
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM | 1 | 2 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 | 2 | 3 |
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 | 4 | 10 |
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 1 | 61 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 4 | 29 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 3 | 29 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 13 | 23 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 33 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 30 | 20 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 10 | 16 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 4 | 25 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 4 | 25 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 6 | 18 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 | 1 | 15 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 | 3 | 9 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 3 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 29 | 18 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 22 | 19 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 8 | 6 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 7 | 18 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 6 | 14 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 7 | 24 |
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 | 7 | 6 |
pdf_data/st_keywords/cipher_mode | |
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library | |
|
pdf_data/st_keywords/crypto_scheme | |
|
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/hash_function | |
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RND | 5 | 4 |
pdf_data/st_keywords/randomness/RNG/RNG | 11 | 9 |
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/randomness/TRNG/TRNG | 1 | 12 |
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction | 10 | 8 |
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 1 | 9 |
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent | 13 | 9 |
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/BSI/AIS31 | 3 | 8 |
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA | 3 | 1 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 9 | 3 |
pdf_data/st_keywords/symmetric_crypto/DES/DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 30 | 23 |
pdf_data/st_keywords/technical_report_id | |
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Hans-Gerd Albertsen | Oleg Rudakov |
pdf_data/st_metadata//CreationDate | D:20080416152215Z | D:20161202144109+01'00' |
pdf_data/st_metadata//Keywords | Security IC (Smart Card) evaluation; Assurance Level EAL5+ (AVA_VLA.4); BSI-PP-0002-2001 compliant; P5CC024V0A Security Requirements, Security Objectives and Security Functions | Infineon AG |
pdf_data/st_metadata//ModDate | D:20080701142434+02'00' | D:20161202144109+01'00' |
pdf_data/st_metadata//Producer | AFPL Ghostscript 8.14 | Microsoft® Word 2010 |
pdf_data/st_metadata//Subject | P5CC024V0A Common Criteria Evaluation | Product Security Certification |
pdf_data/st_metadata//Title | Security Target Lite P5CC024V0A | M7892 D11 and G12 Public Security Target |
pdf_data/st_metadata/pdf_file_size_bytes | 656023 | 1913905 |
pdf_data/st_metadata/pdf_hyperlinks | https://www.bsi.bund.de/, http://www.bsi.bund.de/, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.infineon.com/ | |
pdf_data/st_metadata/pdf_number_of_pages | 70 | 101 |
dgst | 3a97768c5b399607 | 48330255bfb2c924 |