Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
BSI-DSZ-CC-0973-2016
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software
BSI-DSZ-CC-1072-V2-2019
name NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software
not_valid_before 2016-06-17 2019-06-27
not_valid_after 2021-06-17 2024-06-27
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1072V2b_pdf.pdf
manufacturer NXP Semiconductors Germany GmbH Business Line Identification NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1072V2a_pdf.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1072V2c_pdf.pdf
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None c7c18e4481cac1996ffd173272bcdd9b8eda7441d542e5740e5856fc7e13d2f4
state/cert/txt_hash None 551f176d9ac8fa921a0ae46a73b01b5dd9920a346cc2531162652db461f321aa
state/report/pdf_hash f327a07b7e7805dbefa4e775cfbad546613b87b0c687ab003f78096aba215d09 5014117432067326cec7b9db089a086e269c6916eec4e40716e2ada85b27c6e0
state/report/txt_hash 0990e1b1d79dd65a6b5942a1a73d1112a219b21828cbffa928303745fefa612e 1167c73570b672965e0a1746163a29e20f28a30cf71528236417b8b2a4a9c5e2
state/st/pdf_hash e42e3f0d502c0e8756f4247901862b82572d9c35c34f32fcf4a5f7820dce1cd9 bc056902b5829c0766f87b7c087b4ca536062703e0fc0fa14daf93d5f195df34
state/st/txt_hash e095e8b483dd2ec93de9dfc3e42f048e9bed1de9cbaff5a9c3fe62dbe80b70d8 a15c0899a00305f9da0ca81b1da3c63b25263d827e431ae1c08ac02cab5989ba
heuristics/cert_id BSI-DSZ-CC-0973-2016 BSI-DSZ-CC-1072-V2-2019
heuristics/extracted_versions 5, 2, 1 -
heuristics/report_references/directly_referenced_by NSCIB-CC-16-99111-CR, NSCIB-CC-16-99111-CR2, ANSSI-CC-2018/10, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2018/09 BSI-DSZ-CC-1072-V3-2019
heuristics/report_references/directly_referencing None BSI-DSZ-CC-1072-2018
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2020/26, BSI-DSZ-CC-1148-V2-2023, ANSSI-CC-2017/34, ANSSI-CC-2019/43-R01, OCSI/CERT/SYS/03/2018/RC, BSI-DSZ-CC-1147-V2-2023, BSI-DSZ-CC-1059-V2-2019, ANSSI-CC-2020/53-R01, ANSSI-CC-2017/49, ANSSI-CC-2018/10, ANSSI-CC-2020/50-R01, ANSSI-CC-2020/53, ANSSI-CC-2020/51-R01, NSCIB-CC-23-67206-CR, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1118-2020, BSI-DSZ-CC-1121-V2-2021, ANSSI-CC-2017/71, BSI-DSZ-CC-1034-2019, NSCIB-CC-16-99111-CR, ANSSI-CC-2020/50, BSI-DSZ-CC-1059-V3-2019, ANSSI-CC-2019/34, ANSSI-CC-2020/51, BSI-DSZ-CC-1103-2019, ANSSI-CC-2019/50, BSI-DSZ-CC-1065-2020, OCSI/CERT/SYS/09/2016/RC, OCSI/CERT/SYS/04/2018/RC, OCSI/CERT/SYS/10/2016/RC, ANSSI-CC-2019/36, ANSSI-CC-2019/48, ANSSI-CC-2020/36, BSI-DSZ-CC-1147-V3-2023, ANSSI-CC-2017/43, BSI-DSZ-CC-1078-2019, ANSSI-CC-2020/26-R01, ANSSI-CC-2018/06, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2022/33, BSI-DSZ-CC-1148-2020, BSI-DSZ-CC-1059-V5-2022, ANSSI-CC-2020/35, BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1064-2020, ANSSI-CC-2018/15, NSCIB-CC-2200035-01-CR, ANSSI-CC-2018/09, BSI-DSZ-CC-1148-V3-2023, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2018/18, BSI-DSZ-CC-1001-2018, OCSI/CERT/SYS/11/2016/RC, BSI-DSZ-CC-1059-2018, ANSSI-CC-2017/69, ANSSI-CC-2019/43, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1034-V2-2021, BSI-DSZ-CC-1147-2020, ANSSI-CC-2019/35, NSCIB-CC-16-99111-CR2, OCSI/CERT/SYS/02/2018/RC, BSI-DSZ-CC-0996-2018, ANSSI-CC-2017/68, ANSSI-CC-2018/17, ANSSI-CC-2017/72, ANSSI-CC-2019/33, ANSSI-CC-2020/46, BSI-DSZ-CC-0995-2018, ANSSI-CC-2020/48, ANSSI-CC-2020/52-R01, ANSSI-CC-2019/28, ANSSI-CC-2019/47, ANSSI-CC-2019/49, ANSSI-CC-2020/38, ANSSI-CC-2017/70, BSI-DSZ-CC-1059-V4-2021, ANSSI-CC-2018/04, ANSSI-CC-2020/52, ANSSI-CC-2023/38, ANSSI-CC-2018/05, ANSSI-CC-2018/16, BSI-DSZ-CC-1023-2018, ANSSI-CC-2020/47, ANSSI-CC-2018/03, ANSSI-CC-2017/35, BSI-DSZ-CC-1211-2023, NSCIB-CC-98209-CR5, ANSSI-CC-2019/41, ANSSI-CC-2020/37 BSI-DSZ-CC-1072-V5-2022, NSCIB-CC-23-66030-CR, BSI-DSZ-CC-1072-V4-2021, BSI-DSZ-CC-1072-V3-2019
heuristics/report_references/indirectly_referencing None BSI-DSZ-CC-1072-2018, BSI-DSZ-CC-0955-2016, BSI-DSZ-CC-0955-V2-2016
heuristics/st_references/directly_referenced_by BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1023-2018, ANSSI-CC-2019/32, ANSSI-CC-2018/10, ANSSI-CC-2018/09, ANSSI-CC-2021/57 None
heuristics/st_references/indirectly_referenced_by BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1023-2018, ANSSI-CC-2019/32, ANSSI-CC-2018/10, ANSSI-CC-2018/09, ANSSI-CC-2021/57 None
pdf_data/cert_filename None 1072V2c_pdf.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • DE:
      • BSI-DSZ-CC-1072-V2-2019: 1
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0084-2014: 1
  • cc_security_level:
    • EAL:
      • EAL 6: 1
      • EAL 5: 1
      • EAL 2: 1
      • EAL 6 augmented: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.1: 1
      • ALC_FLR: 1
    • ASE:
      • ASE_TSS.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
    • NXP:
      • NXP: 1
      • NXP Semiconductors: 1
  • eval_facility:
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
    • ISO:
      • ISO/IEC 15408: 2
      • ISO/IEC 18045: 2
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 341900
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20190702130859+02'00'
  • /Creator: Writer
  • /ModDate: D:20190702130951+02'00'
  • /Producer: LibreOffice 5.2
  • /Subject: NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software
  • /Title: Certification Report BSI-DSZ-CC-1072-V2-2019
  • pdf_hyperlinks:
pdf_data/report_filename 0973a_pdf.pdf 1072V2a_pdf.pdf
pdf_data/report_frontpage/DE/cc_security_level Common Criteria Part 3 conformant P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 SOGIS Recognition Agreement Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0973-2016 BSI-DSZ-CC-1072-V2-2019
pdf_data/report_frontpage/DE/cert_item NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0973-2016: 25
  • BSI-DSZ-CC-1072-V2-2019: 18
  • BSI-DSZ-CC-1072-2018: 2
pdf_data/report_keywords/cc_claims/O/O.C 7 5
pdf_data/report_keywords/cc_claims/R/R.O 7 5
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 3
    • ADV_IMP.2: 2
    • ADV_INT.3: 2
    • ADV_SPM.1: 2
    • ADV_TDS.5: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_INT.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 6
    • ALC_DVS.2: 9
    • ALC_FLR: 3
    • ALC_CMC.5: 3
    • ALC_CMS.5: 5
    • ALC_TAT.3: 3
    • ALC_TAT.2: 3
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 3
    • ALC_DVS.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 3
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.3: 2
    • ATE_DPT.3: 3
    • ATE_FUN.2: 2
    • ATE_FUN: 2
    • ATE_IND: 2
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
  • AVA:
    • AVA_VAN.5: 7
    • AVA_VAN: 3
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_TSS.2: 9
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ALC:
    • ALC_FLR.1: 4
    • ALC_FLR: 3
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_TSS.2: 4
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.1: 6
  • ALC_DVS.2: 9
  • ALC_FLR: 3
  • ALC_CMC.5: 3
  • ALC_CMS.5: 5
  • ALC_TAT.3: 3
  • ALC_TAT.2: 3
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 2
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 3
  • ALC_DVS.1: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 3
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_FLR.1: 4
  • ALC_FLR: 3
  • ALC_CMC.5: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 5 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 9 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 6 4
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 3 1
pdf_data/report_keywords/cc_sar/ASE
  • ASE_TSS.2: 9
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_TSS.2: 4
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 9 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL6: 5
    • EAL 5: 14
    • EAL 2: 7
    • EAL 1: 7
    • EAL 4: 6
    • EAL5: 3
    • EAL 6: 5
    • EAL 5+: 1
    • EAL 3: 4
    • EAL 7: 4
    • EAL6 augmented: 3
    • EAL 5 augmented: 3
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 6: 5
    • EAL 5: 4
    • EAL 2: 2
    • EAL 1: 1
    • EAL 4: 1
    • EAL 2+: 1
    • EAL 5+: 1
    • EAL 6 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL6: 5
  • EAL 5: 14
  • EAL 2: 7
  • EAL 1: 7
  • EAL 4: 6
  • EAL5: 3
  • EAL 6: 5
  • EAL 5+: 1
  • EAL 3: 4
  • EAL 7: 4
  • EAL6 augmented: 3
  • EAL 5 augmented: 3
  • EAL 6: 5
  • EAL 5: 4
  • EAL 2: 2
  • EAL 1: 1
  • EAL 4: 1
  • EAL 2+: 1
  • EAL 5+: 1
  • EAL 6 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 7 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 7 2
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 6 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 14 4
pdf_data/report_keywords/cc_sfr
  • FTP:
    • FTP_TRP.1: 2
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • 1.11, 2016-06-14, NXP Secure Smart Card Controller P6022y VB Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 2, 2016-06-14, EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
  • TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • Evaluation (ETR COMP) for the P6022y VB, version 2, 2016-06-14, TÜV Informationstechnik GmbH (confidential document) [11] Product Data Sheet - SmartMX2 family P6022y VB, Secure high-performance smart card controller: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • Smart Card Controller P6021y VB – Security Target, Version 1.8, 2018-11-21, NXP Semiconductors (confidential document) [7] Evaluation Technical Report BSI-DSZ-CC-1072-V2-2019, Version 2, 2019-04-29, TÜV: 1
  • GmbH , (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • Evaluation (ETR COMP) for the P6021y VB, version 3, 2018-05-07, TÜV Informationstechnik GmbH (confidential document) [11] SmartMX2 family P6021y VB Secure high-performance smart card controller, Objective data sheet: 1
  • Card Controller P6021y VB Evaluation Reference List, Version 2.02, 2019-04-05, NXP Semiconductors (confidential document) [19] Evaluation Technical Report for Composite Evaluation Addendum (ETR-COMP- ADD: 1
  • Version 2, 2019-04-29, TÜV Informationstechnik GmbH (confidential document) • AIS 38, Version 2, Reuse of evaluation results • AIS39, Formal Method, Version 3.0, 24.10.2008 •: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 3
  • CBC:
    • CBC: 11
  • ECB:
    • ECB: 5
pdf_data/report_keywords/cipher_mode/ECB/ECB 3 5
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/eval_facility/TUV
  • TÜV Informationstechnik: 4
  • TÜViT: 1
  • TÜV Informationstechnik: 5
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik 4 5
pdf_data/report_keywords/randomness/RNG/RNG 3 4
pdf_data/report_keywords/randomness/TRNG/TRNG 1 2
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
    • SPA: 1
    • DPA: 1
  • other:
    • JIL: 3
  • SCA:
    • physical probing: 1
  • FI:
    • physical tampering: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/side_channel_analysis/SCA
  • physical probing: 1
  • SPA: 1
  • DPA: 1
  • physical probing: 1
pdf_data/report_keywords/side_channel_analysis/other/JIL 3 4
pdf_data/report_keywords/standard_id
  • NIST:
    • NIST SP 800-67: 3
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 37: 1
    • AIS 31: 2
    • AIS 36: 1
    • AIS31: 1
    • AIS 35: 2
    • AIS 26: 1
    • AIS 32: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 14443: 6
    • ISO/IEC 7816: 2
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 37: 1
    • AIS 31: 3
    • AIS 36: 2
    • AIS31: 2
    • AIS 35: 2
    • AIS 1: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS39: 1
    • AIS46: 1
    • AIS 47: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 37: 1
  • AIS 31: 2
  • AIS 36: 1
  • AIS31: 1
  • AIS 35: 2
  • AIS 26: 1
  • AIS 32: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 37: 1
  • AIS 31: 3
  • AIS 36: 2
  • AIS31: 2
  • AIS 35: 2
  • AIS 1: 1
  • AIS 26: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS39: 1
  • AIS46: 1
  • AIS 47: 1
pdf_data/report_keywords/standard_id/BSI/AIS 31 2 3
pdf_data/report_keywords/standard_id/BSI/AIS 36 1 2
pdf_data/report_keywords/standard_id/BSI/AIS31 1 2
pdf_data/report_keywords/standard_id/ISO/ISO/IEC 14443 6 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 16
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • TDES: 3
      • Triple-DES: 4
  • constructions:
    • MAC:
      • CMAC: 5
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • DES:
      • DES: 4
    • 3DES:
      • TDES: 1
      • Triple-DES: 3
      • TDEA: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 16 7
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • TDES: 3
  • Triple-DES: 4
  • TDES: 1
  • Triple-DES: 3
  • TDEA: 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/TDES 3 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 4 3
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 5 4
pdf_data/report_keywords/vendor/NXP/NXP 26 28
pdf_data/report_keywords/vendor/NXP/NXP Semiconductors 36 26
pdf_data/report_metadata//CreationDate D:20160622114257+02'00' D:20190702125234+02'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Smart Card, NXP Semiconductors Germany GmbH, NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software" "Common Criteria, Certification, Zertifizierung, Smart Card Controller, NXP, EAL6, P60021yVB*"
pdf_data/report_metadata//ModDate D:20160622115419+02'00' D:20190702130732+02'00'
pdf_data/report_metadata//Producer LibreOffice 4.2 LibreOffice 5.2
pdf_data/report_metadata//Subject Common Criteria Certification NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0973-2016 Certification Report BSI-DSZ-CC-1072-V2-2019
pdf_data/report_metadata/pdf_file_size_bytes 1426168 899075
pdf_data/report_metadata/pdf_number_of_pages 44 29
pdf_data/st_filename 0973b_pdf.pdf 1072V2b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 3 2
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0973: 1
  • BSI-DSZ-CC-1072: 1
pdf_data/st_keywords/cc_claims/O
  • O.RND: 3
  • O.TDES: 6
  • O.AES: 6
  • O.CUST_RECONF_PLAIN: 6
  • O.EEPROM_INTEGRITY: 5
  • O.FM_FW: 9
  • O.MEM_ACCESS: 10
  • O.SFR_ACCESS: 9
  • O.PUF: 6
  • O.CUST_RECONF_MIFARE: 6
  • O.ACCESS-CONTROL: 8
  • O.AUTHENTICATION: 7
  • O.ENCRYPTION: 6
  • O.MAC: 6
  • O.TYPE-CONSISTENCY: 4
  • O.DF-TRANSACTION: 4
  • O.TYPE-: 2
  • O.ACCESS-: 1
  • O.DF-: 2
  • O.RND: 3
  • O.TDES: 7
  • O.AES: 7
  • O.CUST_RECONF_PLAIN: 6
  • O.EEPROM_INTEGRITY: 5
  • O.FM_FW: 9
  • O.MEM_ACCESS: 10
  • O.SFR_ACCESS: 8
  • O.PUF: 6
  • O.SFR_: 1
pdf_data/st_keywords/cc_claims/O/O.AES 6 7
pdf_data/st_keywords/cc_claims/O/O.SFR_ACCESS 9 8
pdf_data/st_keywords/cc_claims/O/O.TDES 6 7
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 2
  • ADV_FSP.5: 22
  • ADV_IMP.2: 4
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 1
  • ADV_ARC: 2
  • ADV_FSP: 8
  • ADV_IMP: 2
  • ADV_FSP.4: 6
  • ADV_SPM: 2
  • ADV_IMP.1: 1
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_ARC.1: 1
  • ADV_FSP.5: 11
  • ADV_IMP.2: 3
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 1
  • ADV_ARC: 1
  • ADV_FSP: 3
  • ADV_IMP: 1
  • ADV_FSP.4: 3
  • ADV_SPM: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP 8 3
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 6 3
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 22 11
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 4 3
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 2 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 6
  • ALC_DVS.2: 5
  • ALC_CMC.5: 4
  • ALC_CMS.5: 10
  • ALC_DEL.1: 2
  • ALC_LCD.1: 2
  • ALC_TAT.3: 1
  • ALC_DEL: 2
  • ALC_DVS: 2
  • ALC_CMS: 8
  • ALC_CMC: 5
  • ALC_CMS.4: 6
  • ALC_CMC.4: 4
  • ALC_TAT.2: 1
  • ALC_FLR.1: 6
  • ALC_CMC.5: 4
  • ALC_CMS.5: 5
  • ALC_DEL.1: 1
  • ALC_DVS.2: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_CMS: 3
  • ALC_CMC: 3
  • ALC_CMS.4: 3
  • ALC_CMC.4: 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC 5 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 4 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS 8 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 6 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 10 5
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 5 1
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 2 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_TSS.2: 10
  • ASE_CCL.1: 2
  • ASE_ECD.1: 2
  • ASE_INT.1: 2
  • ASE_OBJ.2: 2
  • ASE_REQ.2: 2
  • ASE_SPD.1: 2
  • ASE_TSS: 2
  • ASE_TSS.2: 6
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.2 10 6
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.3: 4
  • ATE_DPT.3: 2
  • ATE_FUN.2: 1
  • ATE_IND.2: 2
  • ATE_COV: 2
  • ATE_COV.2: 1
  • ATE_FUN.1: 1
  • ATE_COV.3: 3
  • ATE_DPT.3: 1
  • ATE_FUN.2: 1
  • ATE_IND.2: 1
  • ATE_COV: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV 2 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.3 4 3
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 2 1
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 2 1
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN 2 1
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 7 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6: 42
  • EAL5: 38
  • EAL6+: 13
  • EAL5+: 18
  • EAL4: 1
  • EAL4+: 3
  • EAL6 augmented: 4
  • EAL5 augmented: 2
  • EAL4 augmented: 1
  • EAL6: 44
  • EAL6+: 11
  • EAL4: 1
  • EAL4+: 2
  • EAL6 augmented: 5
  • EAL4 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL4+ 3 2
pdf_data/st_keywords/cc_security_level/EAL/EAL6 42 44
pdf_data/st_keywords/cc_security_level/EAL/EAL6 augmented 4 5
pdf_data/st_keywords/cc_security_level/EAL/EAL6+ 13 11
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 34 17
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 65 46
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 5 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 88 45
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 7 4
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_SDC.1: 16
  • FDP_SDI.2: 36
  • FDP_ITT.1: 6
  • FDP_IFC.1: 20
  • FDP_SDI.1: 5
  • FDP_SDI.2.1: 5
  • FDP_SDI.2.2: 5
  • FDP_SDC.1.1: 2
  • FDP_ITC.1: 24
  • FDP_ITC.2: 44
  • FDP_ACC.1: 76
  • FDP_ACC.1.1: 4
  • FDP_ACF.1: 58
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_ITC.2.1: 2
  • FDP_ITC.2.2: 2
  • FDP_ITC.2.3: 2
  • FDP_ITC.2.4: 2
  • FDP_ITC.2.5: 2
  • FDP_ROL.1: 7
  • FDP_ROL.1.1: 1
  • FDP_ROL.1.2: 1
  • FDP_SDC.1: 16
  • FDP_SDI.2: 36
  • FDP_ITT.1: 6
  • FDP_IFC.1: 10
  • FDP_SDI.1: 5
  • FDP_SDI.2.1: 5
  • FDP_SDI.2.2: 5
  • FDP_SDC.1.1: 2
  • FDP_ITC.1: 14
  • FDP_ITC.2: 16
  • FDP_ACC.1: 37
  • FDP_ACC.1.1: 2
  • FDP_ACF.1: 34
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 2
  • FDP_ACF.1.4: 2
  • FDP_ROL.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 76 37
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 58 34
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 20 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 24 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 44 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL.1 7 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.1: 10
  • FIA_UID.2: 17
  • FIA_UAU.2: 15
  • FIA_UAU.1: 2
  • FIA_UAU.5: 13
  • FIA_UAU.5.1: 2
  • FIA_UAU.5.2: 2
  • FIA_UID.2: 2
  • FIA_UAU.2: 2
  • FIA_UAU.5: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 15 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 13 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 17 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM.1: 3
  • FMT_LIM.2: 4
  • FMT_MSA.3: 48
  • FMT_MSA.3.1: 4
  • FMT_MSA.3.2: 4
  • FMT_MSA.1: 53
  • FMT_SMR.1: 33
  • FMT_MSA.1.1: 4
  • FMT_SMF.1: 45
  • FMT_SMF.1.1: 3
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_LIM.1: 3
  • FMT_LIM.2: 4
  • FMT_MSA.3: 24
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MSA.1: 28
  • FMT_MSA.1.1: 2
  • FMT_SMR.1: 7
  • FMT_SMF.1: 22
  • FMT_SMF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 53 28
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 4 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 48 24
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 4 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 4 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 45 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 3 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 33 7
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 8
  • FPT_PHP.3: 8
  • FPT_ITT.1: 6
  • FPT_TDC.1: 19
  • FPT_TDC.1.1: 2
  • FPT_TDC.1.2: 2
  • FPT_RPL.1: 16
  • FPT_RPL.1.1: 2
  • FPT_RPL.1.2: 2
  • FPT_FLS.1: 8
  • FPT_PHP.3: 8
  • FPT_ITT.1: 6
  • FPT_TDC.1: 2
  • FPT_RPL.1: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 16 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1 19 2
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 4
  • FTP_TRP.1: 26
  • FTP_TRP.1.1: 2
  • FTP_TRP.1.2: 2
  • FTP_TRP.1.3: 7
  • FTP_ROL.1: 1
  • FTP_TRP.1: 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 26 2
pdf_data/st_keywords/cipher_mode/CBC/CBC 13 4
pdf_data/st_keywords/crypto_engine/SmartMX/SmartMX2 13 11
pdf_data/st_keywords/crypto_scheme/MAC/MAC 23 8
pdf_data/st_keywords/randomness/RNG/RNG 16 14
pdf_data/st_keywords/standard_id/BSI
  • AIS20: 2
  • AIS31: 4
  • AIS31: 2
pdf_data/st_keywords/standard_id/BSI/AIS31 4 2
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
pdf_data/st_keywords/standard_id/FIPS/FIPS 197 5 3
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 3 2
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 14443 24 20
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 7816 28 24
pdf_data/st_keywords/standard_id/NIST
  • NIST SP 800-67: 6
  • NIST SP 800-38A: 6
  • NIST SP 800-38B: 2
  • NIST SP 800-67: 4
  • NIST SP 800-38A: 3
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-38A 6 3
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-67 6 4
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 121 82
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 54 45
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 30 19
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 6 8
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • CBC-MAC: 2
  • CMAC: 9
  • CBC-MAC: 2
pdf_data/st_keywords/vendor/NXP/NXP 180 204
pdf_data/st_keywords/vendor/NXP/NXP Semiconductors 47 36
pdf_data/st_keywords/vendor/NXP/NXP Semiconductors N.V 129 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 824420
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 129
  • /Author: NXP Semiconductors
  • /CreationDate: D:20160614165343+02'00'
  • /Creator: DITA Open Toolkit
  • /Keywords: CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB
  • /ModDate: D:20160614165719+02'00'
  • /PDFVersion: 1.4
  • /Producer: Apache FOP Version 1.1
  • /Subject: NXP Secure Smart Card Controller P6022y VB
  • /Title: Security Target Lite
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 727734
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 97
  • /Title: Security Target Lite
  • /Author: NXP B.V.
  • /Subject: NXP Secure Smart Card Controller P6021y VB
  • /Keywords: CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6021y VB, P6021P VB, P6021M VB, P6021D VB, P6021J VB
  • /Creator: DITA Open Toolkit
  • /Producer: Apache FOP Version 1.1
  • /CreationDate: D:20190122162315Z
  • pdf_hyperlinks:
pdf_data/st_metadata//Author NXP Semiconductors NXP B.V.
pdf_data/st_metadata//CreationDate D:20160614165343+02'00' D:20190122162315Z
pdf_data/st_metadata//Keywords CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6021y VB, P6021P VB, P6021M VB, P6021D VB, P6021J VB
pdf_data/st_metadata//Subject NXP Secure Smart Card Controller P6022y VB NXP Secure Smart Card Controller P6021y VB
pdf_data/st_metadata/pdf_file_size_bytes 824420 727734
pdf_data/st_metadata/pdf_is_encrypted True False
pdf_data/st_metadata/pdf_number_of_pages 129 97
dgst 6ca6e73099dff023 2ff1474b4f717192