Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
BSI-DSZ-CC-0973-2016
Infineon Smart Card IC (Security Controller), SLE66CX680PE / m1534-a14, SLE66CX360PE / m1536-a14, SLE66CX482PE / m1577-a14, SLE66CX480PE / 1565-a14, SLE66CX182PE / m1564-a14, all optional with RSA 2048 V1.5 and all with specific IC dedicated software
BSI-DSZ-CC-0437-2008
name NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 Infineon Smart Card IC (Security Controller), SLE66CX680PE / m1534-a14, SLE66CX360PE / m1536-a14, SLE66CX482PE / m1577-a14, SLE66CX480PE / 1565-a14, SLE66CX182PE / m1564-a14, all optional with RSA 2048 V1.5 and all with specific IC dedicated software
not_valid_before 2016-06-17 2008-05-27
not_valid_after 2021-06-17 2019-09-01
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0437b.pdf
manufacturer NXP Semiconductors Germany GmbH Business Line Identification Infineon Technologies AG
manufacturer_web https://www.nxp.com https://www.infineon.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0437a.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2009, 1, 29), 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CX680PE / m1534-a14, SLE66CX360PE / m1536-a14, SLE66CX482PE / m1577-a14, SLE66CX480PE / m1565-a14, SLE66CX182PE / m1564-a14, all optional with RSA2048 V1.5 and all with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0437_ma2.pdf', 'maintenance_st_link': None}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2008, 9, 25), 'maintenance_title': 'Infineon Smart Card IC (Security Controller) SLE66CX680PE / m1534-a14, SLE66CX360PE / m1536-a14, SLE66CX482PE / m1577-a14, SLE66CX480PE / m1565-a14, SLE66CX182PE / m1564-a14, all optional with RSA 2048 V1.5 and all with specific Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0437_ma1.pdf', 'maintenance_st_link': None})
state/report/pdf_hash f327a07b7e7805dbefa4e775cfbad546613b87b0c687ab003f78096aba215d09 57562d84ecbc087328699a93cf1ee26206db0c450b96c803b7d7161c5a99e87f
state/report/txt_hash 0990e1b1d79dd65a6b5942a1a73d1112a219b21828cbffa928303745fefa612e 7613d7cc3616bbd09abad672d82847d342da8218c3b1d08a57a9d9cd93b2ae13
state/st/pdf_hash e42e3f0d502c0e8756f4247901862b82572d9c35c34f32fcf4a5f7820dce1cd9 279a1d4f8f886eb5ca729c18b1f9fb2612f1e1721fc78f039d9dfad58451d0d6
state/st/txt_hash e095e8b483dd2ec93de9dfc3e42f048e9bed1de9cbaff5a9c3fe62dbe80b70d8 30bc18a3fc387e217a176a7f290eb004b99756222559d2ba6d330439b6cf46c0
heuristics/cert_id BSI-DSZ-CC-0973-2016 BSI-DSZ-CC-0437-2008
heuristics/extracted_versions 5, 2, 1 1.5
heuristics/report_references/directly_referenced_by NSCIB-CC-16-99111-CR, NSCIB-CC-16-99111-CR2, ANSSI-CC-2018/10, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2018/09 BSI-DSZ-CC-0668-2010, BSI-DSZ-CC-0667-2010, BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0425-2009
heuristics/report_references/directly_referencing None BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0322-2005
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2020/26, BSI-DSZ-CC-1148-V2-2023, ANSSI-CC-2017/34, ANSSI-CC-2019/43-R01, OCSI/CERT/SYS/03/2018/RC, BSI-DSZ-CC-1147-V2-2023, BSI-DSZ-CC-1059-V2-2019, ANSSI-CC-2020/53-R01, ANSSI-CC-2017/49, ANSSI-CC-2018/10, ANSSI-CC-2020/50-R01, ANSSI-CC-2020/53, ANSSI-CC-2020/51-R01, NSCIB-CC-23-67206-CR, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1118-2020, BSI-DSZ-CC-1121-V2-2021, ANSSI-CC-2017/71, BSI-DSZ-CC-1034-2019, NSCIB-CC-16-99111-CR, ANSSI-CC-2020/50, BSI-DSZ-CC-1059-V3-2019, ANSSI-CC-2019/34, ANSSI-CC-2020/51, BSI-DSZ-CC-1103-2019, ANSSI-CC-2019/50, BSI-DSZ-CC-1065-2020, OCSI/CERT/SYS/09/2016/RC, OCSI/CERT/SYS/04/2018/RC, OCSI/CERT/SYS/10/2016/RC, ANSSI-CC-2019/36, ANSSI-CC-2019/48, ANSSI-CC-2020/36, BSI-DSZ-CC-1147-V3-2023, ANSSI-CC-2017/43, BSI-DSZ-CC-1078-2019, ANSSI-CC-2020/26-R01, ANSSI-CC-2018/06, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2022/33, BSI-DSZ-CC-1148-2020, BSI-DSZ-CC-1059-V5-2022, ANSSI-CC-2020/35, BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1064-2020, ANSSI-CC-2018/15, NSCIB-CC-2200035-01-CR, ANSSI-CC-2018/09, BSI-DSZ-CC-1148-V3-2023, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2018/18, BSI-DSZ-CC-1001-2018, OCSI/CERT/SYS/11/2016/RC, BSI-DSZ-CC-1059-2018, ANSSI-CC-2017/69, ANSSI-CC-2019/43, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1034-V2-2021, BSI-DSZ-CC-1147-2020, ANSSI-CC-2019/35, NSCIB-CC-16-99111-CR2, OCSI/CERT/SYS/02/2018/RC, BSI-DSZ-CC-0996-2018, ANSSI-CC-2017/68, ANSSI-CC-2018/17, ANSSI-CC-2017/72, ANSSI-CC-2019/33, ANSSI-CC-2020/46, BSI-DSZ-CC-0995-2018, ANSSI-CC-2020/48, ANSSI-CC-2020/52-R01, ANSSI-CC-2019/28, ANSSI-CC-2019/47, ANSSI-CC-2019/49, ANSSI-CC-2020/38, ANSSI-CC-2017/70, BSI-DSZ-CC-1059-V4-2021, ANSSI-CC-2018/04, ANSSI-CC-2020/52, ANSSI-CC-2023/38, ANSSI-CC-2018/05, ANSSI-CC-2018/16, BSI-DSZ-CC-1023-2018, ANSSI-CC-2020/47, ANSSI-CC-2018/03, ANSSI-CC-2017/35, BSI-DSZ-CC-1211-2023, NSCIB-CC-98209-CR5, ANSSI-CC-2019/41, ANSSI-CC-2020/37 BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0425-2009, BSI-DSZ-CC-0667-2010, BSI-DSZ-CC-0665-2010, BSI-DSZ-CC-0668-2010, BSI-DSZ-CC-0663-2009
heuristics/report_references/indirectly_referencing None BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0399-2007, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0223-2003
heuristics/st_references/directly_referenced_by BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1023-2018, ANSSI-CC-2019/32, ANSSI-CC-2018/10, ANSSI-CC-2018/09, ANSSI-CC-2021/57 BSI-DSZ-CC-0668-2010, BSI-DSZ-CC-0667-2010, BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0425-2009
heuristics/st_references/indirectly_referenced_by BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1023-2018, ANSSI-CC-2019/32, ANSSI-CC-2018/10, ANSSI-CC-2018/09, ANSSI-CC-2021/57 BSI-DSZ-CC-0668-2010, BSI-DSZ-CC-0628-2009, BSI-DSZ-CC-0667-2010, BSI-DSZ-CC-0425-2009
pdf_data/report_filename 0973a_pdf.pdf 0437a.pdf
pdf_data/report_frontpage/DE
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0973-2016
  • cert_item: NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software
  • developer: NXP Semiconductors Germany GmbH
  • cert_lab: BSI
  • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
  • cc_security_level: Common Criteria Part 3 conformant P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 SOGIS Recognition Agreement
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0437-2008
  • cert_item: SLE66CX680PE / m1534-a14, SLE66CX360PE / m1536-a14, SLE66CX482PE / m1577-a14, SLE66CX480PE / m1565-a14, SLE66CX182PE / m1564-a14, all optional with RSA2048 V1.5 and all with specific IC dedicated software
  • developer: Infineon Technologies AG
  • cert_lab: BSI
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0973-2016 BSI-DSZ-CC-0437-2008
pdf_data/report_frontpage/DE/cert_item NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software SLE66CX680PE / m1534-a14, SLE66CX360PE / m1536-a14, SLE66CX482PE / m1577-a14, SLE66CX480PE / m1565-a14, SLE66CX182PE / m1564-a14, all optional with RSA2048 V1.5 and all with specific IC dedicated software
pdf_data/report_frontpage/DE/developer NXP Semiconductors Germany GmbH Infineon Technologies AG
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 33
    • RSA 2048: 4
  • ECC:
    • ECDSA:
      • ECDSA: 1
    • ECC:
      • ECC: 1
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0973-2016: 25
  • DE:
    • BSI-DSZ-CC-0437-2008: 20
    • BSI-DSZ-CC-0322-2007: 2
    • BSI-DSZ-CC-0322-2005: 1
    • BSI-DSZ-CC-0399-2007: 1
    • BSI-DSZ-CC-0437: 1
  • NL:
    • CC-0322-2007: 1
    • CC-0437: 2
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0973-2016: 25
  • BSI-DSZ-CC-0437-2008: 20
  • BSI-DSZ-CC-0322-2007: 2
  • BSI-DSZ-CC-0322-2005: 1
  • BSI-DSZ-CC-0399-2007: 1
  • BSI-DSZ-CC-0437: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 7
  • R:
    • R.O: 7
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084-2014: 4
  • BSI-PP-0002-2001: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 3
    • ADV_IMP.2: 2
    • ADV_INT.3: 2
    • ADV_SPM.1: 2
    • ADV_TDS.5: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_INT.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 6
    • ALC_DVS.2: 9
    • ALC_FLR: 3
    • ALC_CMC.5: 3
    • ALC_CMS.5: 5
    • ALC_TAT.3: 3
    • ALC_TAT.2: 3
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 3
    • ALC_DVS.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 3
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.3: 2
    • ATE_DPT.3: 3
    • ATE_FUN.2: 2
    • ATE_FUN: 2
    • ATE_IND: 2
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
  • AVA:
    • AVA_VAN.5: 7
    • AVA_VAN: 3
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_TSS.2: 9
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ACM:
    • ACM_SCP: 3
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.3: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 4
    • AGD_USR: 2
  • ALC:
    • ALC_DVS.2: 6
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_TAT: 2
    • ALC_LCD.2: 1
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_MSU.3: 5
    • AVA_VLA.4: 6
    • AVA_VLA: 4
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_FSP.5: 3
  • ADV_IMP.2: 2
  • ADV_INT.3: 2
  • ADV_SPM.1: 2
  • ADV_TDS.5: 2
  • ADV_INT.2: 2
  • ADV_TDS.4: 2
  • ADV_ARC.1: 1
  • ADV_FSP.1: 1
  • ADV_FSP.2: 1
  • ADV_FSP.3: 1
  • ADV_FSP.4: 1
  • ADV_FSP.6: 1
  • ADV_IMP.1: 1
  • ADV_INT.1: 1
  • ADV_TDS.1: 1
  • ADV_TDS.2: 1
  • ADV_TDS.3: 1
  • ADV_TDS.6: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_FSP: 2
  • ADV_HLD: 2
  • ADV_IMP: 2
  • ADV_INT: 2
  • ADV_LLD: 2
  • ADV_RCR: 2
  • ADV_SPM: 2
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_INT 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM 1 2
pdf_data/report_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_OPE: 1
  • AGD_PRE: 1
  • AGD_ADM: 4
  • AGD_USR: 2
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.1: 6
  • ALC_DVS.2: 9
  • ALC_FLR: 3
  • ALC_CMC.5: 3
  • ALC_CMS.5: 5
  • ALC_TAT.3: 3
  • ALC_TAT.2: 3
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 2
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 3
  • ALC_DVS.1: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 3
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 6
  • ALC_DVS: 2
  • ALC_FLR: 2
  • ALC_LCD: 1
  • ALC_TAT: 2
  • ALC_LCD.2: 1
  • ALC_TAT.2: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS 1 2
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 9 6
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 3 2
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT 1 2
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 3 1
pdf_data/report_keywords/cc_sar/APE
  • APE_INT.1: 1
  • APE_CCL.1: 1
  • APE_SPD.1: 1
  • APE_OBJ.1: 1
  • APE_OBJ.2: 1
  • APE_ECD.1: 1
  • APE_REQ.1: 1
  • APE_REQ.2: 1
  • APE_DES: 1
  • APE_ENV: 1
  • APE_INT: 1
  • APE_OBJ: 1
  • APE_REQ: 1
  • APE_SRE: 1
pdf_data/report_keywords/cc_sar/ASE
  • ASE_TSS.2: 9
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_DES: 1
  • ASE_ENV: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_PPC: 1
  • ASE_REQ: 1
  • ASE_SRE: 1
  • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/ATE
  • ATE_COV.3: 2
  • ATE_DPT.3: 3
  • ATE_FUN.2: 2
  • ATE_FUN: 2
  • ATE_IND: 2
  • ATE_COV.1: 1
  • ATE_COV.2: 1
  • ATE_DPT.1: 1
  • ATE_DPT.2: 1
  • ATE_DPT.4: 1
  • ATE_FUN.1: 1
  • ATE_IND.1: 1
  • ATE_IND.2: 1
  • ATE_IND.3: 1
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_COV: 2
  • ATE_DPT: 2
  • ATE_FUN: 2
  • ATE_IND: 2
pdf_data/report_keywords/cc_sar/ATE/ATE_COV 1 2
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT 1 2
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.5: 7
  • AVA_VAN: 3
  • AVA_VAN.1: 1
  • AVA_VAN.2: 1
  • AVA_VAN.3: 1
  • AVA_VAN.4: 1
  • AVA_MSU.3: 5
  • AVA_VLA.4: 6
  • AVA_VLA: 4
  • AVA_CCA: 2
  • AVA_MSU: 2
  • AVA_SOF: 3
  • AVA_VLA.2: 1
  • AVA_VLA.3: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL6: 5
    • EAL 5: 14
    • EAL 2: 7
    • EAL 1: 7
    • EAL 4: 6
    • EAL5: 3
    • EAL 6: 5
    • EAL 5+: 1
    • EAL 3: 4
    • EAL 7: 4
    • EAL6 augmented: 3
    • EAL 5 augmented: 3
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 5: 4
    • EAL 4: 5
    • EAL4: 7
    • EAL 1: 1
    • EAL 7: 1
    • EAL5+: 1
    • EAL1: 5
    • EAL3: 4
    • EAL5: 6
    • EAL7: 4
    • EAL2: 3
    • EAL6: 3
    • EAL 5 augmented: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL6: 5
  • EAL 5: 14
  • EAL 2: 7
  • EAL 1: 7
  • EAL 4: 6
  • EAL5: 3
  • EAL 6: 5
  • EAL 5+: 1
  • EAL 3: 4
  • EAL 7: 4
  • EAL6 augmented: 3
  • EAL 5 augmented: 3
  • EAL 5: 4
  • EAL 4: 5
  • EAL4: 7
  • EAL 1: 1
  • EAL 7: 1
  • EAL5+: 1
  • EAL1: 5
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL6: 3
  • EAL 5 augmented: 4
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 7 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 6 5
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 14 4
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 augmented 3 4
pdf_data/report_keywords/cc_security_level/EAL/EAL 7 4 1
pdf_data/report_keywords/cc_security_level/EAL/EAL5 3 6
pdf_data/report_keywords/cc_security_level/EAL/EAL6 5 3
pdf_data/report_keywords/cc_sfr
  • FTP:
    • FTP_TRP.1: 2
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 1
  • FDP:
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FMT:
    • FMT_MSA.2: 1
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • 1.11, 2016-06-14, NXP Secure Smart Card Controller P6022y VB Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 2, 2016-06-14, EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
  • TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • Evaluation (ETR COMP) for the P6022y VB, version 2, 2016-06-14, TÜV Informationstechnik GmbH (confidential document) [11] Product Data Sheet - SmartMX2 family P6022y VB, Secure high-performance smart card controller: 1
  • SLE66CX480PE / m1565-a14, SLE66CX182PE / m1564-a14, All Products with RSA2048 V1.5 library, TÜViT (confidential document) [8] Configuration list for the TOE, Configuration Management Scope (ACM_SCP), SLE66CX680PE : 1
  • SLE66CX182PE / m1564-a14, all Products with RSA2048 V1.5, Version 1.4, 10.08.2007 Infineon (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
  • all products with RSA2048 V1.5 library, Version 1, 2008-04-01, Infineon Technologies AG, TÜViT, (confidential document) [11] Data Book – SLE 66CxxxPE / MicroSlim Security Controller Family, incl. the errata sheet: 1
pdf_data/report_keywords/cipher_mode/CBC/CBC 11 1
pdf_data/report_keywords/cipher_mode/ECB/ECB 3 1
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 8
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik 4 2
pdf_data/report_keywords/eval_facility/TUV/TÜViT 1 2
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 1
  • RNG:
    • RNG: 3
  • RNG:
    • RNG: 5
pdf_data/report_keywords/randomness/RNG/RNG 3 5
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
    • SPA: 1
    • DPA: 1
  • other:
    • JIL: 3
  • SCA:
    • physical probing: 1
    • side channel: 2
    • DPA: 2
    • SPA: 1
  • FI:
    • physical tampering: 1
  • other:
    • Bellcore attack: 1
    • JIL: 4
pdf_data/report_keywords/side_channel_analysis/SCA
  • physical probing: 1
  • SPA: 1
  • DPA: 1
  • physical probing: 1
  • side channel: 2
  • DPA: 2
  • SPA: 1
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 1 2
pdf_data/report_keywords/side_channel_analysis/other
  • JIL: 3
  • Bellcore attack: 1
  • JIL: 4
pdf_data/report_keywords/side_channel_analysis/other/JIL 3 4
pdf_data/report_keywords/standard_id
  • NIST:
    • NIST SP 800-67: 3
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 37: 1
    • AIS 31: 2
    • AIS 36: 1
    • AIS31: 1
    • AIS 35: 2
    • AIS 26: 1
    • AIS 32: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 14443: 6
    • ISO/IEC 7816: 2
  • FIPS:
    • FIPS140: 1
  • BSI:
    • AIS 34: 3
    • AIS 31: 4
    • AIS 25: 3
    • AIS 26: 2
    • AIS 32: 1
    • AIS 35: 1
    • AIS 36: 2
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 37: 1
  • AIS 31: 2
  • AIS 36: 1
  • AIS31: 1
  • AIS 35: 2
  • AIS 26: 1
  • AIS 32: 1
  • AIS 34: 3
  • AIS 31: 4
  • AIS 25: 3
  • AIS 26: 2
  • AIS 32: 1
  • AIS 35: 1
  • AIS 36: 2
  • AIS 38: 1
pdf_data/report_keywords/standard_id/BSI/AIS 25 2 3
pdf_data/report_keywords/standard_id/BSI/AIS 26 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 31 2 4
pdf_data/report_keywords/standard_id/BSI/AIS 34 2 3
pdf_data/report_keywords/standard_id/BSI/AIS 35 2 1
pdf_data/report_keywords/standard_id/BSI/AIS 36 1 2
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
  • ISO/IEC 14443: 6
  • ISO/IEC 7816: 2
  • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 16
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • TDES: 3
      • Triple-DES: 4
  • constructions:
    • MAC:
      • CMAC: 5
  • DES:
    • DES:
      • DES: 12
    • 3DES:
      • Triple-DES: 6
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • TDES: 3
  • Triple-DES: 4
  • Triple-DES: 6
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 4 6
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 5 12
pdf_data/report_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI 7148: 1
  • BSI 7125: 2
  • BSI 7148: 1
  • BSI 7149: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 26
    • NXP Semiconductors: 36
  • Infineon:
    • Infineon Technologies AG: 11
    • Infineon: 24
    • Infineon AG: 1
    • Infineon Technologies: 5
  • Philips:
    • Philips: 1
pdf_data/report_metadata//CreationDate D:20160622114257+02'00' D:20080606110001+02'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Smart Card, NXP Semiconductors Germany GmbH, NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software" "Infineon, Common Criteria, BSI-DSZ-CC-0437-2008, SLE66CX680PE, SLE66CX360PE, SLE66CX482PE, SLE66CX480PE, SLE66CX182PE all optional with RSA2048 V1.5 and all with specific IC dedicated software"
pdf_data/report_metadata//ModDate D:20160622115419+02'00' D:20080606113010+02'00'
pdf_data/report_metadata//Producer LibreOffice 4.2 StarOffice 8
pdf_data/report_metadata//Subject Common Criteria Certification BSI-DSZ-CC-0437-2008
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0973-2016 Certification Report BSI-DSZ-CC-0437-2008
pdf_data/report_metadata/pdf_file_size_bytes 1426168 515020
pdf_data/report_metadata/pdf_hyperlinks https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte http://www.bsi.bund.de/
pdf_data/report_metadata/pdf_number_of_pages 44 38
pdf_data/st_filename 0973b_pdf.pdf 0437b.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
  • RSA:
    • RSA2048: 19
  • ECC:
    • ECC:
      • ECC: 9
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 3 9
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0973: 1
pdf_data/st_keywords/cc_claims/O
  • O.RND: 3
  • O.TDES: 6
  • O.AES: 6
  • O.CUST_RECONF_PLAIN: 6
  • O.EEPROM_INTEGRITY: 5
  • O.FM_FW: 9
  • O.MEM_ACCESS: 10
  • O.SFR_ACCESS: 9
  • O.PUF: 6
  • O.CUST_RECONF_MIFARE: 6
  • O.ACCESS-CONTROL: 8
  • O.AUTHENTICATION: 7
  • O.ENCRYPTION: 6
  • O.MAC: 6
  • O.TYPE-CONSISTENCY: 4
  • O.DF-TRANSACTION: 4
  • O.TYPE-: 2
  • O.ACCESS-: 1
  • O.DF-: 2
  • O.RND: 1
pdf_data/st_keywords/cc_claims/O/O.RND 3 1
pdf_data/st_keywords/cc_claims/T/T.RND 2 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0084-2014: 2
  • BSI-PP-0002: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.5: 22
    • ADV_IMP.2: 4
    • ADV_INT.3: 1
    • ADV_TDS.5: 1
    • ADV_SPM.1: 1
    • ADV_ARC: 2
    • ADV_FSP: 8
    • ADV_IMP: 2
    • ADV_FSP.4: 6
    • ADV_SPM: 2
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
    • AGD_OPE: 2
    • AGD_PRE: 2
  • ALC:
    • ALC_FLR.1: 6
    • ALC_DVS.2: 5
    • ALC_CMC.5: 4
    • ALC_CMS.5: 10
    • ALC_DEL.1: 2
    • ALC_LCD.1: 2
    • ALC_TAT.3: 1
    • ALC_DEL: 2
    • ALC_DVS: 2
    • ALC_CMS: 8
    • ALC_CMC: 5
    • ALC_CMS.4: 6
    • ALC_CMC.4: 4
    • ALC_TAT.2: 1
  • ATE:
    • ATE_COV.3: 4
    • ATE_DPT.3: 2
    • ATE_FUN.2: 1
    • ATE_IND.2: 2
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 7
    • AVA_VAN: 2
  • ASE:
    • ASE_TSS.2: 10
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS: 2
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 1
    • ACM_SCP.3: 5
    • ACM_SCP: 3
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.3: 5
    • ADV_HLD.3: 3
    • ADV_IMP.2: 3
    • ADV_INT.1: 3
    • ADV_LLD.1: 3
    • ADV_RCR.2: 3
    • ADV_SPM.3: 2
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.2: 4
    • ALC_LCD.2: 1
    • ALC_TAT.2: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.3: 3
    • AVA_VLA.4: 4
    • AVA_CCA.1: 2
    • AVA_SOF.1: 2
    • AVA_SOF: 4
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 2
  • ADV_FSP.5: 22
  • ADV_IMP.2: 4
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 1
  • ADV_ARC: 2
  • ADV_FSP: 8
  • ADV_IMP: 2
  • ADV_FSP.4: 6
  • ADV_SPM: 2
  • ADV_IMP.1: 1
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP.3: 5
  • ADV_HLD.3: 3
  • ADV_IMP.2: 3
  • ADV_INT.1: 3
  • ADV_LLD.1: 3
  • ADV_RCR.2: 3
  • ADV_SPM.3: 2
  • ADV_FSP: 1
  • ADV_FSP.2: 1
  • ADV_SPM.1: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP 8 1
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 4 3
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 1 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 2
  • AGD_PRE.1: 2
  • AGD_OPE: 2
  • AGD_PRE: 2
  • AGD_ADM.1: 2
  • AGD_USR.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 6
  • ALC_DVS.2: 5
  • ALC_CMC.5: 4
  • ALC_CMS.5: 10
  • ALC_DEL.1: 2
  • ALC_LCD.1: 2
  • ALC_TAT.3: 1
  • ALC_DEL: 2
  • ALC_DVS: 2
  • ALC_CMS: 8
  • ALC_CMC: 5
  • ALC_CMS.4: 6
  • ALC_CMC.4: 4
  • ALC_TAT.2: 1
  • ALC_DVS.2: 4
  • ALC_LCD.2: 1
  • ALC_TAT.2: 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 5 4
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 1 2
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.3: 4
  • ATE_DPT.3: 2
  • ATE_FUN.2: 1
  • ATE_IND.2: 2
  • ATE_COV: 2
  • ATE_COV.2: 1
  • ATE_FUN.1: 1
  • ATE_COV.2: 2
  • ATE_DPT.2: 1
  • ATE_FUN.1: 2
  • ATE_IND.2: 2
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 2
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 7
  • AVA_VAN: 2
  • AVA_MSU.3: 3
  • AVA_VLA.4: 4
  • AVA_CCA.1: 2
  • AVA_SOF.1: 2
  • AVA_SOF: 4
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6: 42
  • EAL5: 38
  • EAL6+: 13
  • EAL5+: 18
  • EAL4: 1
  • EAL4+: 3
  • EAL6 augmented: 4
  • EAL5 augmented: 2
  • EAL4 augmented: 1
  • EAL5+: 3
  • EAL5: 4
  • EAL 5: 4
  • EAL5 augmented: 1
  • EAL 5 augmented: 4
pdf_data/st_keywords/cc_security_level/EAL/EAL5 38 4
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 2 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5+ 18 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG.1: 8
    • FCS_COP.1: 88
    • FCS_CKM.4: 65
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
    • FCS_CKM.1: 34
    • FCS_COP.1.1: 7
    • FCS_CKM.4.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
  • FDP:
    • FDP_SDC.1: 16
    • FDP_SDI.2: 36
    • FDP_ITT.1: 6
    • FDP_IFC.1: 20
    • FDP_SDI.1: 5
    • FDP_SDI.2.1: 5
    • FDP_SDI.2.2: 5
    • FDP_SDC.1.1: 2
    • FDP_ITC.1: 24
    • FDP_ITC.2: 44
    • FDP_ACC.1: 76
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 58
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_ROL.1: 7
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
  • FIA:
    • FIA_UID.1: 10
    • FIA_UID.2: 17
    • FIA_UAU.2: 15
    • FIA_UAU.1: 2
    • FIA_UAU.5: 13
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 4
    • FMT_MSA.3: 48
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MSA.1: 53
    • FMT_SMR.1: 33
    • FMT_MSA.1.1: 4
    • FMT_SMF.1: 45
    • FMT_SMF.1.1: 3
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_FLS.1: 8
    • FPT_PHP.3: 8
    • FPT_ITT.1: 6
    • FPT_TDC.1: 19
    • FPT_TDC.1.1: 2
    • FPT_TDC.1.2: 2
    • FPT_RPL.1: 16
    • FPT_RPL.1.1: 2
    • FPT_RPL.1.2: 2
  • FRU:
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP.1: 26
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 7
    • FTP_ROL.1: 1
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_RND: 2
    • FCS_RND.1: 4
    • FCS_COP.1: 29
    • FCS_CKM.1: 34
    • FCS_COP.1.1: 2
    • FCS_CKM.4: 21
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 4
    • FCS_CKM.4.1: 2
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ITT.1: 3
    • FDP_IFC.1: 10
    • FDP_ACC.1: 22
    • FDP_ACF.1: 15
    • FDP_SDI.1: 17
    • FDP_SDI.2: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ACF.1.1: 1
    • FDP_ITC.1: 17
    • FDP_ITC.2: 16
    • FDP_SDI.1.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC.1.1: 2
    • FDP_ITC.1.2: 2
    • FDP_ITC.1.3: 2
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_CKM.2: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
    • FMT_MSA.3: 15
    • FMT_MSA.1: 14
    • FMT_SMF.1: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMR.1: 8
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 22
    • FMT_MSA.2.1: 2
  • FPT:
    • FPT_TST.2: 26
    • FPT_FLS.1: 5
    • FPT_SEP.1: 6
    • FPT_PHP.3: 7
    • FPT_ITT.1: 3
    • FPT_TST.1: 11
    • FPT_TST.2.1: 2
    • FPT_AMT.1: 4
    • FPT_TDC.1: 2
    • FPT_TST: 2
  • FRU:
    • FRU_FLT.2: 5
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS.1: 7
  • FAU_SAS.1.1: 1
  • FAU_SAS.1: 4
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 7 4
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 8
  • FCS_COP.1: 88
  • FCS_CKM.4: 65
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 2
  • FCS_CKM.1: 34
  • FCS_COP.1.1: 7
  • FCS_CKM.4.1: 5
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 2
  • FCS_RND: 2
  • FCS_RND.1: 4
  • FCS_COP.1: 29
  • FCS_CKM.1: 34
  • FCS_COP.1.1: 2
  • FCS_CKM.4: 21
  • FCS_CKM.1.1: 3
  • FCS_CKM.2: 4
  • FCS_CKM.4.1: 2
  • FCS_RND.1.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 1 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 2 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 65 21
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 5 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 88 29
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 7 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_SDC.1: 16
  • FDP_SDI.2: 36
  • FDP_ITT.1: 6
  • FDP_IFC.1: 20
  • FDP_SDI.1: 5
  • FDP_SDI.2.1: 5
  • FDP_SDI.2.2: 5
  • FDP_SDC.1.1: 2
  • FDP_ITC.1: 24
  • FDP_ITC.2: 44
  • FDP_ACC.1: 76
  • FDP_ACC.1.1: 4
  • FDP_ACF.1: 58
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_ITC.2.1: 2
  • FDP_ITC.2.2: 2
  • FDP_ITC.2.3: 2
  • FDP_ITC.2.4: 2
  • FDP_ITC.2.5: 2
  • FDP_ROL.1: 7
  • FDP_ROL.1.1: 1
  • FDP_ROL.1.2: 1
  • FDP_ITT.1: 3
  • FDP_IFC.1: 10
  • FDP_ACC.1: 22
  • FDP_ACF.1: 15
  • FDP_SDI.1: 17
  • FDP_SDI.2: 15
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ACF.1.1: 1
  • FDP_ITC.1: 17
  • FDP_ITC.2: 16
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC.1.1: 2
  • FDP_ITC.1.2: 2
  • FDP_ITC.1.3: 2
  • FDP_ITC.2.1: 2
  • FDP_ITC.2.2: 2
  • FDP_ITC.2.3: 2
  • FDP_ITC.2.4: 2
  • FDP_ITC.2.5: 2
  • FDP_CKM.2: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 76 22
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 58 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 20 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 24 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 44 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 6 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 5 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 36 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 5 1
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM.1: 3
  • FMT_LIM.2: 4
  • FMT_MSA.3: 48
  • FMT_MSA.3.1: 4
  • FMT_MSA.3.2: 4
  • FMT_MSA.1: 53
  • FMT_SMR.1: 33
  • FMT_MSA.1.1: 4
  • FMT_SMF.1: 45
  • FMT_SMF.1.1: 3
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_LIM.1: 4
  • FMT_LIM.2: 4
  • FMT_MSA.3: 15
  • FMT_MSA.1: 14
  • FMT_SMF.1: 9
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_SMR.1: 8
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 22
  • FMT_MSA.2.1: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 3 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 53 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 4 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 48 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 4 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 4 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 45 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 3 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 33 8
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 8
  • FPT_PHP.3: 8
  • FPT_ITT.1: 6
  • FPT_TDC.1: 19
  • FPT_TDC.1.1: 2
  • FPT_TDC.1.2: 2
  • FPT_RPL.1: 16
  • FPT_RPL.1.1: 2
  • FPT_RPL.1.2: 2
  • FPT_TST.2: 26
  • FPT_FLS.1: 5
  • FPT_SEP.1: 6
  • FPT_PHP.3: 7
  • FPT_ITT.1: 3
  • FPT_TST.1: 11
  • FPT_TST.2.1: 2
  • FPT_AMT.1: 4
  • FPT_TDC.1: 2
  • FPT_TST: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 8 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 6 3
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 8 7
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1 19 2
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 8 5
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 4
  • FTP_TRP.1: 26
  • FTP_TRP.1.1: 2
  • FTP_TRP.1.2: 2
  • FTP_TRP.1.3: 7
  • FTP_ROL.1: 1
  • FTP_ITC.1: 2
  • FTP_TRP.1: 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 4 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 26 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • single DES is out of scope of the evaluation: 1
    • key lengths below 1024 bit are out of scope of the evaluation: 1
    • smart card applications, • data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation), • data encryption according to RSA standard with 512 to 2048 bits key length: 1
    • lengths below 1024 bit are out of scope of the evaluation), Public SLE66CX680_360_482_480_182PE Security Target V1.3 Date: 2007-03-22: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 6
  • CBC:
    • CBC: 13
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 13
    • SmartMX: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 23
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
  • RNG:
    • RND: 5
    • RNG: 16
  • RNG:
    • RNG: 7
    • RND: 2
pdf_data/st_keywords/randomness/RNG/RND 5 2
pdf_data/st_keywords/randomness/RNG/RNG 16 7
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 11
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 1
    • DPA: 2
    • timing attacks: 2
  • FI:
    • physical tampering: 1
    • Malfunction: 10
    • malfunction: 2
    • fault injection: 2
  • SCA:
    • Leak-Inherent: 11
    • Physical Probing: 2
    • SPA: 3
    • DPA: 5
  • FI:
    • Malfunction: 15
    • malfunction: 3
    • DFA: 3
  • other:
    • reverse engineering: 2
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • Malfunction: 10
  • malfunction: 2
  • fault injection: 2
  • Malfunction: 15
  • malfunction: 3
  • DFA: 3
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 10 15
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 2 3
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 11
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 1
  • DPA: 2
  • timing attacks: 2
  • Leak-Inherent: 11
  • Physical Probing: 2
  • SPA: 3
  • DPA: 5
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 2 5
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 197: 5
    • FIPS PUB 197: 3
  • NIST:
    • NIST SP 800-67: 6
    • NIST SP 800-38A: 6
    • NIST SP 800-38B: 2
  • BSI:
    • AIS20: 2
    • AIS31: 4
  • ISO:
    • ISO/IEC 7816: 28
    • ISO/IEC 14443: 24
    • ISO/IEC 9797-1: 1
    • ISO/IEC 18092: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS PUB 46-3: 2
  • BSI:
    • AIS31: 9
  • ISO:
    • ISO/IEC7816-3: 1
    • ISO/IEC 9796-1: 3
    • ISO/IEC 7816: 4
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-002: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS20: 2
  • AIS31: 4
  • AIS31: 9
pdf_data/st_keywords/standard_id/BSI/AIS31 4 9
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2005-08-001: 1
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-002: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 197: 5
  • FIPS PUB 197: 3
  • FIPS PUB 46-3: 2
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 7816: 28
  • ISO/IEC 14443: 24
  • ISO/IEC 9797-1: 1
  • ISO/IEC 18092: 2
  • ISO/IEC7816-3: 1
  • ISO/IEC 9796-1: 3
  • ISO/IEC 7816: 4
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 7816 28 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 121
  • DES:
    • DES:
      • DES: 6
      • DEA: 1
    • 3DES:
      • Triple-DES: 30
      • TDES: 54
      • TDEA: 1
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 9
  • DES:
    • DES:
      • DES: 11
    • 3DES:
      • 3DES: 20
      • Triple-DES: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 30
  • TDES: 54
  • TDEA: 1
  • 3DES: 20
  • Triple-DES: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 30 1
pdf_data/st_keywords/symmetric_crypto/DES/DES
  • DES: 6
  • DEA: 1
  • DES: 11
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 6 11
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 180
    • NXP Semiconductors: 47
    • NXP Semiconductors N.V: 129
  • Infineon:
    • Infineon Technologies AG: 8
    • Infineon: 2
pdf_data/st_metadata
  • pdf_file_size_bytes: 824420
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 129
  • /Author: NXP Semiconductors
  • /CreationDate: D:20160614165343+02'00'
  • /Creator: DITA Open Toolkit
  • /Keywords: CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB
  • /ModDate: D:20160614165719+02'00'
  • /PDFVersion: 1.4
  • /Producer: Apache FOP Version 1.1
  • /Subject: NXP Secure Smart Card Controller P6022y VB
  • /Title: Security Target Lite
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 302819
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
  • /CreationDate: D:20080603104359Z
  • /Subject: CC EAL5+ Certification Security Target
  • /Author: Hans-Ulrich Buchmüller
  • /Creator: SecurityTarget_CX680_360_482_480_182PE_a14_1.3_05.doc - Microsoft Word
  • /Keywords: Design Step a14, RSA, libraries, Security Target, Security Controller, public, document, resistance to attackers with high attack potential, Infineon, SLE66CX680PE, high security
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /ModDate: D:20080606113047+02'00'
  • /Title: SecurityTarget_SLE66CX680_360_482_480_182PE a14
  • pdf_hyperlinks:
pdf_data/st_metadata//Author NXP Semiconductors Hans-Ulrich Buchmüller
pdf_data/st_metadata//CreationDate D:20160614165343+02'00' D:20080603104359Z
pdf_data/st_metadata//Creator DITA Open Toolkit SecurityTarget_CX680_360_482_480_182PE_a14_1.3_05.doc - Microsoft Word
pdf_data/st_metadata//Keywords CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB Design Step a14, RSA, libraries, Security Target, Security Controller, public, document, resistance to attackers with high attack potential, Infineon, SLE66CX680PE, high security
pdf_data/st_metadata//ModDate D:20160614165719+02'00' D:20080606113047+02'00'
pdf_data/st_metadata//Producer Apache FOP Version 1.1 Acrobat PDFWriter 5.0 for Windows NT
pdf_data/st_metadata//Subject NXP Secure Smart Card Controller P6022y VB CC EAL5+ Certification Security Target
pdf_data/st_metadata//Title Security Target Lite SecurityTarget_SLE66CX680_360_482_480_182PE a14
pdf_data/st_metadata/pdf_file_size_bytes 824420 302819
pdf_data/st_metadata/pdf_is_encrypted True False
pdf_data/st_metadata/pdf_number_of_pages 129 54
dgst 6ca6e73099dff023 158f2e487ac4b630