Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
BSI-DSZ-CC-0973-2016
Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software
BSI-DSZ-CC-0827-V4-2016
name NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software
not_valid_before 2016-06-17 2016-11-23
not_valid_after 2021-06-17 2021-11-23
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V4b_pdf.pdf
manufacturer NXP Semiconductors Germany GmbH Business Line Identification Infineon Technologies AG
manufacturer_web https://www.nxp.com https://www.infineon.com/
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V4a_pdf.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})})
state/report/pdf_hash f327a07b7e7805dbefa4e775cfbad546613b87b0c687ab003f78096aba215d09 0d97f0b5532f5a687413a7ccae85ca3d278477b5795bd16537ee5722e74a748e
state/report/txt_hash 0990e1b1d79dd65a6b5942a1a73d1112a219b21828cbffa928303745fefa612e 7155542acac11697fa673dda7044a75258ffe26fcc0dbb83d85fc83aba20a93d
state/st/pdf_hash e42e3f0d502c0e8756f4247901862b82572d9c35c34f32fcf4a5f7820dce1cd9 eba39ff320b0452694d746c3fc546a8cae3557c996ca334ef102c350048ac799
state/st/txt_hash e095e8b483dd2ec93de9dfc3e42f048e9bed1de9cbaff5a9c3fe62dbe80b70d8 176a98682e63c6ae49a8f1e0bf180b6fdab47df4bad371d48f92241e508e4318
heuristics/cert_id BSI-DSZ-CC-0973-2016 BSI-DSZ-CC-0827-V4-2016
heuristics/extracted_versions 5, 2, 1 1.01.0008, 4.00.009, 2.01.011, 1.03.006, 2.05.005
heuristics/report_references/directly_referenced_by NSCIB-CC-16-99111-CR, NSCIB-CC-16-99111-CR2, ANSSI-CC-2018/10, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2018/09 CSEC2014007, BSI-DSZ-CC-0827-V5-2017
heuristics/report_references/directly_referencing None BSI-DSZ-CC-0827-V3-2015
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2020/26, BSI-DSZ-CC-1148-V2-2023, ANSSI-CC-2017/34, ANSSI-CC-2019/43-R01, OCSI/CERT/SYS/03/2018/RC, BSI-DSZ-CC-1147-V2-2023, BSI-DSZ-CC-1059-V2-2019, ANSSI-CC-2020/53-R01, ANSSI-CC-2017/49, ANSSI-CC-2018/10, ANSSI-CC-2020/50-R01, ANSSI-CC-2020/53, ANSSI-CC-2020/51-R01, NSCIB-CC-23-67206-CR, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1118-2020, BSI-DSZ-CC-1121-V2-2021, ANSSI-CC-2017/71, BSI-DSZ-CC-1034-2019, NSCIB-CC-16-99111-CR, ANSSI-CC-2020/50, BSI-DSZ-CC-1059-V3-2019, ANSSI-CC-2019/34, ANSSI-CC-2020/51, BSI-DSZ-CC-1103-2019, ANSSI-CC-2019/50, BSI-DSZ-CC-1065-2020, OCSI/CERT/SYS/09/2016/RC, OCSI/CERT/SYS/04/2018/RC, OCSI/CERT/SYS/10/2016/RC, ANSSI-CC-2019/36, ANSSI-CC-2019/48, ANSSI-CC-2020/36, BSI-DSZ-CC-1147-V3-2023, ANSSI-CC-2017/43, BSI-DSZ-CC-1078-2019, ANSSI-CC-2020/26-R01, ANSSI-CC-2018/06, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2022/33, BSI-DSZ-CC-1148-2020, BSI-DSZ-CC-1059-V5-2022, ANSSI-CC-2020/35, BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1064-2020, ANSSI-CC-2018/15, NSCIB-CC-2200035-01-CR, ANSSI-CC-2018/09, BSI-DSZ-CC-1148-V3-2023, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2018/18, BSI-DSZ-CC-1001-2018, OCSI/CERT/SYS/11/2016/RC, BSI-DSZ-CC-1059-2018, ANSSI-CC-2017/69, ANSSI-CC-2019/43, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1034-V2-2021, BSI-DSZ-CC-1147-2020, ANSSI-CC-2019/35, NSCIB-CC-16-99111-CR2, OCSI/CERT/SYS/02/2018/RC, BSI-DSZ-CC-0996-2018, ANSSI-CC-2017/68, ANSSI-CC-2018/17, ANSSI-CC-2017/72, ANSSI-CC-2019/33, ANSSI-CC-2020/46, BSI-DSZ-CC-0995-2018, ANSSI-CC-2020/48, ANSSI-CC-2020/52-R01, ANSSI-CC-2019/28, ANSSI-CC-2019/47, ANSSI-CC-2019/49, ANSSI-CC-2020/38, ANSSI-CC-2017/70, BSI-DSZ-CC-1059-V4-2021, ANSSI-CC-2018/04, ANSSI-CC-2020/52, ANSSI-CC-2023/38, ANSSI-CC-2018/05, ANSSI-CC-2018/16, BSI-DSZ-CC-1023-2018, ANSSI-CC-2020/47, ANSSI-CC-2018/03, ANSSI-CC-2017/35, BSI-DSZ-CC-1211-2023, NSCIB-CC-98209-CR5, ANSSI-CC-2019/41, ANSSI-CC-2020/37 CSEC2014007, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V5-2017
heuristics/report_references/indirectly_referencing None BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0791-2012
heuristics/st_references/directly_referenced_by BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1023-2018, ANSSI-CC-2019/32, ANSSI-CC-2018/10, ANSSI-CC-2018/09, ANSSI-CC-2021/57 CSEC2014007
heuristics/st_references/indirectly_referenced_by BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1023-2018, ANSSI-CC-2019/32, ANSSI-CC-2018/10, ANSSI-CC-2018/09, ANSSI-CC-2021/57 CSEC2014007
pdf_data/report_filename 0973a_pdf.pdf 0827V4a_pdf.pdf
pdf_data/report_frontpage/DE/cc_security_level Common Criteria Part 3 conformant P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 SOGIS Recognition Agreement Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0973-2016 BSI-DSZ-CC-0827-V4-2016
pdf_data/report_frontpage/DE/cert_item NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 – RSA4096 v1.03.006 / v2.05.005 – EC v1.03.006 / v2.05.005 – Toolbox v1.03.006 / v2.05.005 – Base v1.03.006 / v2.05.005 – FTL v1.01.0008 – SCL v2.01.011 – PSL v4.00.009 and with specific IC dedicated software
pdf_data/report_frontpage/DE/developer NXP Semiconductors Germany GmbH Infineon Technologies AG
pdf_data/report_frontpage/DE/ref_protection_profiles Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014 Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 9
    • RSA4096: 9
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
    • ECC:
      • ECC: 4
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0973-2016: 25
  • BSI-DSZ-CC-0827-V4-2016: 26
  • BSI-DSZ-CC-0827-V3-2015: 3
pdf_data/report_keywords/cc_claims/O/O.C 7 1
pdf_data/report_keywords/cc_claims/R/R.O 7 1
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084-2014: 4
  • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.5 3 2
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP.2 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.3 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM.1 2 1
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.5 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 5 3
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 3 2
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 9 7
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 6 1
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 3 2
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 3 1
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 9 1
pdf_data/report_keywords/cc_sar/ATE/ATE_COV.3 2 1
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT.3 3 2
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN 2 1
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN.2 2 1
pdf_data/report_keywords/cc_sar/ATE/ATE_IND 2 1
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 3 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 7 6
pdf_data/report_keywords/cc_security_level/EAL
  • EAL6: 5
  • EAL 5: 14
  • EAL 2: 7
  • EAL 1: 7
  • EAL 4: 6
  • EAL5: 3
  • EAL 6: 5
  • EAL 5+: 1
  • EAL 3: 4
  • EAL 7: 4
  • EAL6 augmented: 3
  • EAL 5 augmented: 3
  • EAL 5: 14
  • EAL 4: 9
  • EAL 1: 7
  • EAL 2: 4
  • EAL 5+: 1
  • EAL 6: 4
  • EAL 3: 4
  • EAL 7: 4
  • EAL 5 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 7 4
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 6 9
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 5 4
pdf_data/report_keywords/cc_sfr
  • FTP:
    • FTP_TRP.1: 2
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • 1.11, 2016-06-14, NXP Secure Smart Card Controller P6022y VB Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 2, 2016-06-14, EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
  • TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • Evaluation (ETR COMP) for the P6022y VB, version 2, 2016-06-14, TÜV Informationstechnik GmbH (confidential document) [11] Product Data Sheet - SmartMX2 family P6022y VB, Secure high-performance smart card controller: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • Target M9900, M9905, M9906 including optional Software Libraries RSA-EC-SCL-PSL”, Infineon (confidential document) [7] Evaluation Technical Report, Version 2, 2016-10-11, Evaluation Technical Report Summary, TÜV: 1
  • GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 9: 1
  • 2, 2016-10-11, “Evaluation Technical Report for Composite Evaluation”, TÜV Informationstechnik (confidential document) [11] Configuration list for the TOE, 0.9.1, 2016-08-17, “Configuration Management Scope M9900: 1
  • M9906 including optional Software Libraries RSA-EC-SCL-PSL” (confidential document) [12] M9900 Security Guidelines User’s Manual, 2015-08-19, Infineon [13] SLE97 M9900 Hardware: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 3
  • CBC:
    • CBC: 11
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 8
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library 2.01.011: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/eval_facility/TUV
  • TÜV Informationstechnik: 4
  • TÜViT: 1
  • TÜV Informationstechnik: 4
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 1
  • RNG:
    • RNG: 3
  • TRNG:
    • TRNG: 1
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 2
pdf_data/report_keywords/randomness/RNG/RNG 3 2
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
    • SPA: 1
    • DPA: 1
  • other:
    • JIL: 3
  • SCA:
    • physical probing: 1
    • SPA: 3
    • DPA: 4
  • FI:
    • physical tampering: 1
    • DFA: 4
  • other:
    • JIL: 4
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 1 4
pdf_data/report_keywords/side_channel_analysis/SCA/SPA 1 3
pdf_data/report_keywords/side_channel_analysis/other/JIL 3 4
pdf_data/report_keywords/standard_id
  • NIST:
    • NIST SP 800-67: 3
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 37: 1
    • AIS 31: 2
    • AIS 36: 1
    • AIS31: 1
    • AIS 35: 2
    • AIS 26: 1
    • AIS 32: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 14443: 6
    • ISO/IEC 7816: 2
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 36: 3
    • AIS 35: 2
    • AIS31: 1
    • AIS 19: 1
    • AIS 14: 1
    • AIS 23: 1
    • AIS 32: 1
    • AIS 37: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 37: 1
  • AIS 31: 2
  • AIS 36: 1
  • AIS31: 1
  • AIS 35: 2
  • AIS 26: 1
  • AIS 32: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 3
  • AIS 36: 3
  • AIS 35: 2
  • AIS31: 1
  • AIS 19: 1
  • AIS 14: 1
  • AIS 23: 1
  • AIS 32: 1
  • AIS 37: 1
  • AIS 38: 1
pdf_data/report_keywords/standard_id/BSI/AIS 26 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 31 2 3
pdf_data/report_keywords/standard_id/BSI/AIS 36 1 3
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
  • ISO/IEC 14443: 6
  • ISO/IEC 7816: 2
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 16
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • TDES: 3
      • Triple-DES: 4
  • constructions:
    • MAC:
      • CMAC: 5
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • DES:
      • DES: 8
    • 3DES:
      • Triple-DES: 2
      • 3DES: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 16 9
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • TDES: 3
  • Triple-DES: 4
  • Triple-DES: 2
  • 3DES: 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 4 2
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 5 8
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 26
    • NXP Semiconductors: 36
  • Infineon:
    • Infineon: 25
    • Infineon Technologies AG: 11
    • Infineon Technologies: 8
  • GD:
    • G&D: 1
    • Giesecke & Devrient: 1
pdf_data/report_metadata//CreationDate D:20160622114257+02'00' D:20161129141134+01'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Smart Card, NXP Semiconductors Germany GmbH, NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software" "Common Criteria, Certification, Zertifizierung, SmartCard, Pepe, PP-0084, Infineon BSI-DSZ-CC-0827-V4"
pdf_data/report_metadata//ModDate D:20160622115419+02'00' D:20161130144903+01'00'
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0973-2016 Certification Report BSI-DSZ-CC-0827-V4-2016
pdf_data/report_metadata/pdf_file_size_bytes 1426168 1233762
pdf_data/st_filename 0973b_pdf.pdf 0827V4b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
  • RSA:
    • RSA2048: 3
    • RSA4096: 3
    • RSA-2048: 1
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 17
    • ECC:
      • ECC: 84
  • FF:
    • DH:
      • Diffie-Hellman: 7
    • DSA:
      • DSA: 2
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECC:
    • ECC: 3
  • ECDH:
    • ECDH: 8
  • ECDSA:
    • ECDSA: 17
  • ECC:
    • ECC: 84
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 3 84
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0973: 1
pdf_data/st_keywords/cc_claims/O
  • O.RND: 3
  • O.TDES: 6
  • O.AES: 6
  • O.CUST_RECONF_PLAIN: 6
  • O.EEPROM_INTEGRITY: 5
  • O.FM_FW: 9
  • O.MEM_ACCESS: 10
  • O.SFR_ACCESS: 9
  • O.PUF: 6
  • O.CUST_RECONF_MIFARE: 6
  • O.ACCESS-CONTROL: 8
  • O.AUTHENTICATION: 7
  • O.ENCRYPTION: 6
  • O.MAC: 6
  • O.TYPE-CONSISTENCY: 4
  • O.DF-TRANSACTION: 4
  • O.TYPE-: 2
  • O.ACCESS-: 1
  • O.DF-: 2
  • O.RND: 1
pdf_data/st_keywords/cc_claims/O/O.RND 3 1
pdf_data/st_keywords/cc_claims/T/T.RND 2 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0084-2014: 2
  • BSI-PP-0035: 3
  • BSI-CC-PP-0035-2007: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 2
  • ADV_FSP.5: 22
  • ADV_IMP.2: 4
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 1
  • ADV_ARC: 2
  • ADV_FSP: 8
  • ADV_IMP: 2
  • ADV_FSP.4: 6
  • ADV_SPM: 2
  • ADV_IMP.1: 1
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_ARC.1: 2
  • ADV_FSP.5: 3
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP: 1
  • ADV_FSP.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP 8 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 6 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 22 3
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.1 1 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 2
  • AGD_PRE.1: 2
  • AGD_OPE: 2
  • AGD_PRE: 2
  • AGD_OPE.1: 2
  • AGD_PRE.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 6
  • ALC_DVS.2: 5
  • ALC_CMC.5: 4
  • ALC_CMS.5: 10
  • ALC_DEL.1: 2
  • ALC_LCD.1: 2
  • ALC_TAT.3: 1
  • ALC_DEL: 2
  • ALC_DVS: 2
  • ALC_CMS: 8
  • ALC_CMC: 5
  • ALC_CMS.4: 6
  • ALC_CMC.4: 4
  • ALC_TAT.2: 1
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 3
  • ALC_CMS: 1
  • ALC_TAT: 1
  • ALC_CMS.4: 1
  • ALC_TAT.1: 1
  • ALC_DVS.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 4 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS 8 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 6 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 10 3
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 5 9
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 1 3
pdf_data/st_keywords/cc_sar/ASE
  • ASE_TSS.2: 10
  • ASE_CCL.1: 2
  • ASE_ECD.1: 2
  • ASE_INT.1: 2
  • ASE_OBJ.2: 2
  • ASE_REQ.2: 2
  • ASE_SPD.1: 2
  • ASE_TSS: 2
  • ASE_INT: 2
  • ASE_CCL: 2
  • ASE_SPD: 2
  • ASE_OBJ: 2
  • ASE_ECD: 2
  • ASE_REQ: 2
  • ASE_TSS: 2
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 2 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.3: 4
  • ATE_DPT.3: 2
  • ATE_FUN.2: 1
  • ATE_IND.2: 2
  • ATE_COV: 2
  • ATE_COV.2: 1
  • ATE_FUN.1: 1
  • ATE_COV.2: 1
  • ATE_DPT.3: 4
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_DPT.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 2 4
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 2 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 7
  • AVA_VAN: 2
  • AVA_VAN.5: 11
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 7 11
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6: 42
  • EAL5: 38
  • EAL6+: 13
  • EAL5+: 18
  • EAL4: 1
  • EAL4+: 3
  • EAL6 augmented: 4
  • EAL5 augmented: 2
  • EAL4 augmented: 1
  • EAL5: 7
  • EAL5+: 1
  • EAL 5: 4
  • EAL5 augmented: 3
  • EAL 5 augmented: 3
pdf_data/st_keywords/cc_security_level/EAL/EAL5 38 7
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 2 3
pdf_data/st_keywords/cc_security_level/EAL/EAL5+ 18 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG.1: 8
    • FCS_COP.1: 88
    • FCS_CKM.4: 65
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
    • FCS_CKM.1: 34
    • FCS_COP.1.1: 7
    • FCS_CKM.4.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
  • FDP:
    • FDP_SDC.1: 16
    • FDP_SDI.2: 36
    • FDP_ITT.1: 6
    • FDP_IFC.1: 20
    • FDP_SDI.1: 5
    • FDP_SDI.2.1: 5
    • FDP_SDI.2.2: 5
    • FDP_SDC.1.1: 2
    • FDP_ITC.1: 24
    • FDP_ITC.2: 44
    • FDP_ACC.1: 76
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 58
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_ROL.1: 7
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
  • FIA:
    • FIA_UID.1: 10
    • FIA_UID.2: 17
    • FIA_UAU.2: 15
    • FIA_UAU.1: 2
    • FIA_UAU.5: 13
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 4
    • FMT_MSA.3: 48
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MSA.1: 53
    • FMT_SMR.1: 33
    • FMT_MSA.1.1: 4
    • FMT_SMF.1: 45
    • FMT_SMF.1.1: 3
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_FLS.1: 8
    • FPT_PHP.3: 8
    • FPT_ITT.1: 6
    • FPT_TDC.1: 19
    • FPT_TDC.1.1: 2
    • FPT_TDC.1.2: 2
    • FPT_RPL.1: 16
    • FPT_RPL.1.1: 2
    • FPT_RPL.1.2: 2
  • FRU:
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP.1: 26
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 7
    • FTP_ROL.1: 1
  • FAU:
    • FAU_SAS.1: 10
    • FAU_SAS: 5
    • FAU_GEN: 1
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG: 29
    • FCS_RNG.1: 25
    • FCS_COP.1: 37
    • FCS_CKM.1: 42
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
    • FCS_COP: 126
    • FCS_CKM.4: 33
    • FCS_CKM: 29
    • FCS_CKM.2: 6
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACF.1: 20
    • FDP_SDI.1: 17
    • FDP_SDI.2: 15
    • FDP_ITT.1: 11
    • FDP_IFC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 26
    • FDP_ITC.2: 26
    • FDP_SDI.1.1: 1
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_PHP.3: 1
  • FIA:
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 2
  • FMT:
    • FMT_MSA.1: 18
    • FMT_MSA.3: 19
    • FMT_SMF.1: 15
    • FMT_LIM: 3
    • FMT_LIM.1: 7
    • FMT_LIM.2: 8
    • FMT_SMR.1: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
  • FPT:
    • FPT_TST: 5
    • FPT_TST.2: 34
    • FPT_TST.1: 12
    • FPT_TST.2.1: 2
    • FPT_FLS.1: 18
    • FPT_PHP.3: 14
    • FPT_ITT.1: 13
    • FPT_FLS: 1
  • FRU:
    • FRU_FLT.2: 8
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS.1: 7
  • FAU_SAS.1.1: 1
  • FAU_SAS.1: 10
  • FAU_SAS: 5
  • FAU_GEN: 1
  • FAU_SAS.1.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 7 10
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 8
  • FCS_COP.1: 88
  • FCS_CKM.4: 65
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 2
  • FCS_CKM.1: 34
  • FCS_COP.1.1: 7
  • FCS_CKM.4.1: 5
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 2
  • FCS_RNG: 29
  • FCS_RNG.1: 25
  • FCS_COP.1: 37
  • FCS_CKM.1: 42
  • FCS_RNG.1.1: 2
  • FCS_RNG.1.2: 2
  • FCS_COP: 126
  • FCS_CKM.4: 33
  • FCS_CKM: 29
  • FCS_CKM.2: 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 34 42
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 2 6
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 65 33
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 88 37
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 8 25
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 3 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_SDC.1: 16
  • FDP_SDI.2: 36
  • FDP_ITT.1: 6
  • FDP_IFC.1: 20
  • FDP_SDI.1: 5
  • FDP_SDI.2.1: 5
  • FDP_SDI.2.2: 5
  • FDP_SDC.1.1: 2
  • FDP_ITC.1: 24
  • FDP_ITC.2: 44
  • FDP_ACC.1: 76
  • FDP_ACC.1.1: 4
  • FDP_ACF.1: 58
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_ITC.2.1: 2
  • FDP_ITC.2.2: 2
  • FDP_ITC.2.3: 2
  • FDP_ITC.2.4: 2
  • FDP_ITC.2.5: 2
  • FDP_ROL.1: 7
  • FDP_ROL.1.1: 1
  • FDP_ROL.1.2: 1
  • FDP_ACC.1: 23
  • FDP_ACF.1: 20
  • FDP_SDI.1: 17
  • FDP_SDI.2: 15
  • FDP_ITT.1: 11
  • FDP_IFC.1: 14
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 26
  • FDP_ITC.2: 26
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_PHP.3: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 76 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 58 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 4 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 20 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 24 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 44 26
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 6 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 5 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 36 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 5 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 5 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.1: 10
  • FIA_UID.2: 17
  • FIA_UAU.2: 15
  • FIA_UAU.1: 2
  • FIA_UAU.5: 13
  • FIA_UAU.5.1: 2
  • FIA_UAU.5.2: 2
  • FIA_SOS.2: 3
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM.1: 3
  • FMT_LIM.2: 4
  • FMT_MSA.3: 48
  • FMT_MSA.3.1: 4
  • FMT_MSA.3.2: 4
  • FMT_MSA.1: 53
  • FMT_SMR.1: 33
  • FMT_MSA.1.1: 4
  • FMT_SMF.1: 45
  • FMT_SMF.1.1: 3
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_MSA.1: 18
  • FMT_MSA.3: 19
  • FMT_SMF.1: 15
  • FMT_LIM: 3
  • FMT_LIM.1: 7
  • FMT_LIM.2: 8
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 3 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 4 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 53 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 4 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 48 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 4 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 4 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 45 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 3 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 33 6
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 8
  • FPT_PHP.3: 8
  • FPT_ITT.1: 6
  • FPT_TDC.1: 19
  • FPT_TDC.1.1: 2
  • FPT_TDC.1.2: 2
  • FPT_RPL.1: 16
  • FPT_RPL.1.1: 2
  • FPT_RPL.1.2: 2
  • FPT_TST: 5
  • FPT_TST.2: 34
  • FPT_TST.1: 12
  • FPT_TST.2.1: 2
  • FPT_FLS.1: 18
  • FPT_PHP.3: 14
  • FPT_ITT.1: 13
  • FPT_FLS: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 8 18
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 6 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 8 14
pdf_data/st_keywords/cipher_mode/CBC/CBC 13 18
pdf_data/st_keywords/cipher_mode/ECB/ECB 6 11
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 13
    • SmartMX: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 23
  • MAC:
    • MAC: 20
  • KA:
    • Key Agreement: 4
pdf_data/st_keywords/crypto_scheme/MAC/MAC 23 20
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-192: 4
    • K-163: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA1: 56
    • SHA2:
      • SHA256: 56
  • MD:
    • MD5:
      • MD5: 56
pdf_data/st_keywords/randomness/RNG/RND 5 2
pdf_data/st_keywords/randomness/RNG/RNG 16 17
pdf_data/st_keywords/randomness/TRNG/TRNG 1 14
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 11
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 1
    • DPA: 2
    • timing attacks: 2
  • FI:
    • physical tampering: 1
    • Malfunction: 10
    • malfunction: 2
    • fault injection: 2
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 7
    • Side-channel: 1
    • SPA: 6
    • DPA: 7
    • Timing Attack: 1
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 7
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • Malfunction: 10
  • malfunction: 2
  • fault injection: 2
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 10 12
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 2 1
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 11
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 1
  • DPA: 2
  • timing attacks: 2
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 7
  • Side-channel: 1
  • SPA: 6
  • DPA: 7
  • Timing Attack: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 2 7
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 11 10
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 1 7
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 197: 5
    • FIPS PUB 197: 3
  • NIST:
    • NIST SP 800-67: 6
    • NIST SP 800-38A: 6
    • NIST SP 800-38B: 2
  • BSI:
    • AIS20: 2
    • AIS31: 4
  • ISO:
    • ISO/IEC 7816: 28
    • ISO/IEC 14443: 24
    • ISO/IEC 9797-1: 1
    • ISO/IEC 18092: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS PUB 197: 6
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 5
    • AIS32: 4
  • RFC:
    • RFC3447: 17
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9797-1: 4
    • ISO/IEC 15946-: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS20: 2
  • AIS31: 4
  • AIS31: 5
  • AIS32: 4
pdf_data/st_keywords/standard_id/BSI/AIS31 4 5
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-001 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-002 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2012-09-003 2 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 197: 5
  • FIPS PUB 197: 3
  • FIPS PUB 197: 6
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 3 6
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 7816: 28
  • ISO/IEC 14443: 24
  • ISO/IEC 9797-1: 1
  • ISO/IEC 18092: 2
  • ISO/IEC 7816-3: 1
  • ISO/IEC 9797-1: 4
  • ISO/IEC 15946-: 2
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 9797-1 1 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 121
  • DES:
    • DES:
      • DES: 6
      • DEA: 1
    • 3DES:
      • Triple-DES: 30
      • TDES: 54
      • TDEA: 1
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 9
  • AES_competition:
    • AES:
      • AES: 56
  • DES:
    • DES:
      • DES: 16
    • 3DES:
      • Triple-DES: 3
      • 3DES: 28
      • TDES: 6
      • TDEA: 6
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 121 56
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 30
  • TDES: 54
  • TDEA: 1
  • Triple-DES: 3
  • 3DES: 28
  • TDES: 6
  • TDEA: 6
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA 1 6
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 54 6
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 30 3
pdf_data/st_keywords/symmetric_crypto/DES/DES
  • DES: 6
  • DEA: 1
  • DES: 16
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 6 16
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 4
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 180
    • NXP Semiconductors: 47
    • NXP Semiconductors N.V: 129
  • Infineon:
    • Infineon Technologies: 7
    • Infineon: 7
    • Infineon Technologies AG: 19
pdf_data/st_metadata
  • pdf_file_size_bytes: 824420
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 129
  • /Author: NXP Semiconductors
  • /CreationDate: D:20160614165343+02'00'
  • /Creator: DITA Open Toolkit
  • /Keywords: CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB
  • /ModDate: D:20160614165719+02'00'
  • /PDFVersion: 1.4
  • /Producer: Apache FOP Version 1.1
  • /Subject: NXP Secure Smart Card Controller P6022y VB
  • /Title: Security Target Lite
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1339240
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 95
  • /Title: Security Target Lite, BSI-DSZ-CC-0827-V4-2016
  • /Author: Jürgen Noller, Rainer Urian (IFAG CCS SQM PS)
  • /Subject: Security Target Lite
  • /Keywords: Infineon, Security Target Lite, PP0084, BSI-CC-PP-0035-2007, BSI-DSZ-CC-0827-V4-2016
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20161129124810+01'00'
  • /ModDate: D:20161129124810+01'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks: http://www.ietf.org/rfc/rfc5639.txt, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.bsi.bund.de/, http://www.infineon.com/
pdf_data/st_metadata//Author NXP Semiconductors Jürgen Noller, Rainer Urian (IFAG CCS SQM PS)
pdf_data/st_metadata//CreationDate D:20160614165343+02'00' D:20161129124810+01'00'
pdf_data/st_metadata//Creator DITA Open Toolkit Microsoft® Word 2010
pdf_data/st_metadata//Keywords CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB Infineon, Security Target Lite, PP0084, BSI-CC-PP-0035-2007, BSI-DSZ-CC-0827-V4-2016
pdf_data/st_metadata//ModDate D:20160614165719+02'00' D:20161129124810+01'00'
pdf_data/st_metadata//Producer Apache FOP Version 1.1 Microsoft® Word 2010
pdf_data/st_metadata//Subject NXP Secure Smart Card Controller P6022y VB Security Target Lite
pdf_data/st_metadata//Title Security Target Lite Security Target Lite, BSI-DSZ-CC-0827-V4-2016
pdf_data/st_metadata/pdf_file_size_bytes 824420 1339240
pdf_data/st_metadata/pdf_hyperlinks http://www.ietf.org/rfc/rfc5639.txt, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.bsi.bund.de/, http://www.infineon.com/
pdf_data/st_metadata/pdf_is_encrypted True False
pdf_data/st_metadata/pdf_number_of_pages 129 95
dgst 6ca6e73099dff023 37a743f92a3da4a3