| name | NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 | Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software | 
                            
                                | category | ICs, Smart Cards and Smart Card-Related Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems | 
                            
                                | scheme | DE | DE | 
                            
                                | status | archived | archived | 
                            
                                | not_valid_after | 17.06.2021 | 01.09.2019 | 
                            
                                | not_valid_before | 17.06.2016 | 05.09.2012 | 
                            
                                | cert_link | None | None | 
                            
                                | report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0829a_pdf.pdf | 
                            
                                | st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0829b_pdf.pdf | 
                            
                                | manufacturer | NXP Semiconductors Germany GmbH Business Line Identification | Infineon Technologies AG | 
                            
                                | manufacturer_web | https://www.nxp.com | https://www.infineon.com/ | 
                            
                                | security_level | ALC_DVS.2, EAL5+, ASE_TSS.2, AVA_VAN.5 | ALC_DVS.2, EAL5+, AVA_VAN.5 | 
                            
                                | dgst | 6ca6e73099dff023 | 6de5e7a68582ea80 | 
                            
                                | heuristics/cert_id | BSI-DSZ-CC-0973-2016 | BSI-DSZ-CC-0829-2012 | 
                            
                                | heuristics/cert_lab | BSI | BSI | 
                            
                                | heuristics/cpe_matches | {} | cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* | 
                            
                                | heuristics/verified_cpe_matches | {} | {} | 
                            
                                | heuristics/related_cves | {} | CVE-2017-15361 | 
                            
                                | heuristics/direct_transitive_cves | {} | CVE-2017-15361 | 
                            
                                | heuristics/indirect_transitive_cves | {} | CVE-2017-15361 | 
                            
                                | heuristics/extracted_sars | ALC_LCD.1, ALC_FLR.1, ASE_OBJ.2, APE_OBJ.2, ASE_SPD.1, ASE_CCL.1, AGD_PRE.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, ALC_CMC.5, ADV_TDS.5, ALC_DEL.1, ATE_COV.3, ATE_DPT.3, ADV_SPM.1, ADV_IMP.2, ADV_INT.3, ASE_TSS.2, AVA_VAN.5, APE_CCL.1, ATE_IND.2, APE_ECD.1, ALC_DVS.2, APE_SPD.1, APE_INT.1, ASE_INT.1, ASE_REQ.2, AGD_OPE.1, ASE_ECD.1, APE_REQ.2, ADV_ARC.1, ALC_CMS.5 | ALC_FLR.3, ALC_LCD.1, ATE_COV.2, ASE_OBJ.2, APE_OBJ.2, ASE_SPD.1, ASE_CCL.1, AGD_PRE.1, ADV_INT.2, ADV_TDS.4, ALC_CMC.4, ADV_IMP.1, ADV_FSP.5, ALC_DEL.1, ADV_SPM.1, ATE_DPT.3, AVA_VAN.5, ATE_FUN.1, APE_CCL.1, ATE_IND.2, APE_ECD.1, ALC_DVS.2, APE_SPD.1, APE_INT.1, ASE_INT.1, ASE_REQ.2, AGD_OPE.1, ASE_TSS.1, ASE_ECD.1, ALC_TAT.2, APE_REQ.2, ADV_ARC.1, ALC_CMS.5 | 
                            
                                | heuristics/extracted_versions | 1, 2, 5 | 1.01, 1.02.013 | 
                            
                                | heuristics/prev_certificates | {} | {} | 
                            
                                | heuristics/next_certificates | {} | {} | 
                            
                                | heuristics/report_references/directly_referenced_by | NSCIB-CC-16-99111-CR, NSCIB-CC-16-99111-CR2, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2018/10, ANSSI-CC-2018/09 | CRP290, ANSSI-CC-2014/08, ANSSI-CC-2014/48, ANSSI-CC-2014/09, ANSSI-CC-2015/25, ANSSI-CC-2014/13, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, BSI-DSZ-CC-0904-2015, ANSSI-CC-2014/11, ANSSI-CC-2014/06, ANSSI-CC-2014/62, ANSSI-CC-2014/49, ANSSI-CC-2013/64, ANSSI-CC-2014/50, ANSSI-CC-2013/35, ANSSI-CC-2013/55, BSI-DSZ-CC-0898-2014, ANSSI-CC-2013/42, ANSSI-CC-2013/32, ANSSI-CC-2014/61, ANSSI-CC-2013/34, ANSSI-CC-2014/14, ANSSI-CC-2013/33, ANSSI-CC-2015/09, ANSSI-CC-2014/12 | 
                            
                                | heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-0728-2011 | 
                            
                                | heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-1036-2019, ANSSI-CC-2020/50-R01, ANSSI-CC-2018/06, BSI-DSZ-CC-1148-V2-2023, ANSSI-CC-2020/51-R01, BSI-DSZ-CC-1211-2023, BSI-DSZ-CC-1064-2020, BSI-DSZ-CC-1103-2019, BSI-DSZ-CC-1059-V2-2019, ANSSI-CC-2020/38, OCSI/CERT/SYS/02/2018/RC, ANSSI-CC-2019/48, ANSSI-CC-2018/10, ANSSI-CC-2023/38, BSI-DSZ-CC-1059-V4-2021, ANSSI-CC-2020/50, OCSI/CERT/SYS/10/2016/RC, ANSSI-CC-2019/47, ANSSI-CC-2017/68, ANSSI-CC-2017/43, BSI-DSZ-CC-1121-V2-2021, NSCIB-CC-23-67206-CR, ANSSI-CC-2020/47, BSI-DSZ-CC-1220-2024, ANSSI-CC-2022/33, BSI-DSZ-CC-1078-2019, BSI-DSZ-CC-1221-2024, ANSSI-CC-2018/03, BSI-DSZ-CC-1118-2020, ANSSI-CC-2017/71, BSI-DSZ-CC-1065-2020, BSI-DSZ-CC-1034-V2-2021, ANSSI-CC-2020/52-R01, OCSI/CERT/SYS/11/2016/RC, OCSI/CERT/SYS/03/2018/RC, NSCIB-CC-98209-CR5, OCSI/CERT/SYS/09/2016/RC, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1219-2024, ANSSI-CC-2017/34, BSI-DSZ-CC-1023-2018, ANSSI-CC-2018/15, ANSSI-CC-2020/48, ANSSI-CC-2018/16, ANSSI-CC-2020/52, ANSSI-CC-2017/49, BSI-DSZ-CC-1147-2020, BSI-DSZ-CC-1033-V2-2021, OCSI/CERT/SYS/04/2018/RC, ANSSI-CC-2020/46, ANSSI-CC-2020/36, BSI-DSZ-CC-1147-V3-2023, ANSSI-CC-2019/50, ANSSI-CC-2018/05, ANSSI-CC-2020/26, ANSSI-CC-2017/69, NSCIB-CC-16-99111-CR, NSCIB-CC-16-99111-CR2, ANSSI-CC-2018/04, ANSSI-CC-2020/51, ANSSI-CC-2018/18, ANSSI-CC-2019/43, ANSSI-CC-2019/28, ANSSI-CC-2020/35, ANSSI-CC-2020/53-R01, ANSSI-CC-2020/26-R01, BSI-DSZ-CC-1147-V2-2023, ANSSI-CC-2019/36, ANSSI-CC-2019/34, ANSSI-CC-2018/09, ANSSI-CC-2019/49, BSI-DSZ-CC-0996-2018, ANSSI-CC-2020/37, ANSSI-CC-2017/70, ANSSI-CC-2017/35, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1148-V3-2023, BSI-DSZ-CC-1059-V3-2019, ANSSI-CC-2019/43-R01, ANSSI-CC-2020/53, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1001-2018, ANSSI-CC-2017/72, ANSSI-CC-2019/41, NSCIB-CC-2200035-01-CR, BSI-DSZ-CC-0995-2018, BSI-DSZ-CC-1148-2020, BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1034-2019, ANSSI-CC-2019/35, ANSSI-CC-2019/33, ANSSI-CC-2018/17, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1059-V5-2022 | CRP290, ANSSI-CC-2015/08, ANSSI-CC-2016/74, ANSSI-CC-2014/48, ANSSI-CC-2014/08, ANSSI-CC-2016/75, ANSSI-CC-2014/09, ANSSI-CC-2015/25, BSI-DSZ-CC-0941-2016, ANSSI-CC-2015/03, ANSSI-CC-2014/13, ANSSI-CC-2015/04, BSI-DSZ-CC-0952-V2-2016, BSI-DSZ-CC-0829-V2-2015, BSI-DSZ-CC-0904-V2-2021, ANSSI-CC-2014/07, ANSSI-CC-2015/41, BSI-DSZ-CC-0904-2015, ANSSI-CC-2015/39, ANSSI-CC-2015/30, ANSSI-CC-2014/11, ANSSI-CC-2016/73, ANSSI-CC-2015/15, ANSSI-CC-2014/06, ANSSI-CC-2014/62, ANSSI-CC-2014/49, ANSSI-CC-2013/64, ANSSI-CC-2014/50, ANSSI-CC-2013/35, ANSSI-CC-2013/55, BSI-DSZ-CC-0898-2014, ANSSI-CC-2015/01, ANSSI-CC-2013/42, ANSSI-CC-2013/32, ANSSI-CC-2015/37, ANSSI-CC-2014/61, ANSSI-CC-2015/02, ANSSI-CC-2013/34, BSI-DSZ-CC-0836-V2-2017, ANSSI-CC-2014/14, ANSSI-CC-2013/33, ANSSI-CC-2014/86, ANSSI-CC-2015/40, ANSSI-CC-2015/38, ANSSI-CC-2015/09, ANSSI-CC-2016/04, ANSSI-CC-2014/12, ANSSI-CC-2016/03, BSI-DSZ-CC-0835-V2-2017 | 
                            
                                | heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011 | 
                            
                                | heuristics/scheme_data |  |  | 
                            
                                | heuristics/st_references/directly_referenced_by | BSI-DSZ-CC-1024-2018, ANSSI-CC-2021/57, BSI-DSZ-CC-1022-2018, ANSSI-CC-2018/10, BSI-DSZ-CC-1023-2018, ANSSI-CC-2019/32, ANSSI-CC-2018/09 | ANSSI-CC-2016/74, ANSSI-CC-2014/48, ANSSI-CC-2014/08, ANSSI-CC-2016/75, ANSSI-CC-2014/09, ANSSI-CC-2014/13, ANSSI-CC-2014/07, BSI-DSZ-CC-0904-2015, ANSSI-CC-2014/11, ANSSI-CC-2016/73, ANSSI-CC-2014/06, ANSSI-CC-2014/62, ANSSI-CC-2013/35, BSI-DSZ-CC-0898-2014, ANSSI-CC-2013/32, ANSSI-CC-2014/61, ANSSI-CC-2013/34, ANSSI-CC-2014/14, ANSSI-CC-2013/33, ANSSI-CC-2015/09, ANSSI-CC-2014/12 | 
                            
                                | heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0695-2011 | 
                            
                                | heuristics/st_references/indirectly_referenced_by | BSI-DSZ-CC-1024-2018, ANSSI-CC-2021/57, BSI-DSZ-CC-1022-2018, ANSSI-CC-2018/10, BSI-DSZ-CC-1023-2018, ANSSI-CC-2019/32, ANSSI-CC-2018/09 | ANSSI-CC-2016/74, ANSSI-CC-2014/48, ANSSI-CC-2014/08, ANSSI-CC-2016/75, ANSSI-CC-2014/09, ANSSI-CC-2014/13, ANSSI-CC-2014/07, BSI-DSZ-CC-0904-2015, ANSSI-CC-2014/11, ANSSI-CC-2016/73, ANSSI-CC-2014/06, ANSSI-CC-2014/62, ANSSI-CC-2013/35, BSI-DSZ-CC-0898-2014, ANSSI-CC-2013/32, ANSSI-CC-2014/61, ANSSI-CC-2013/34, ANSSI-CC-2014/14, ANSSI-CC-2013/33, ANSSI-CC-2015/09, ANSSI-CC-2014/12 | 
                            
                                | heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0695-2011 | 
                            
                                | heuristics/protection_profiles | cf0f01bcd7be3e9c | f6d23054061d72ba | 
                            
                                | maintenance_updates |  |  | 
                            
                                | protection_profiles |  |  | 
                            
                                | protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf | 
                            
                                | pdf_data/cert_filename | None | None | 
                            
                                | pdf_data/cert_frontpage |  |  | 
                            
                                | pdf_data/cert_keywords/cc_cert_id |  |  | 
                            
                                | pdf_data/cert_keywords/cc_protection_profile_id |  |  | 
                            
                                | pdf_data/cert_keywords/cc_security_level |  |  | 
                            
                                | pdf_data/cert_keywords/cc_sar |  |  | 
                            
                                | pdf_data/cert_keywords/cc_sfr |  |  | 
                            
                                | pdf_data/cert_keywords/cc_claims |  |  | 
                            
                                | pdf_data/cert_keywords/vendor |  |  | 
                            
                                | pdf_data/cert_keywords/eval_facility |  |  | 
                            
                                | pdf_data/cert_keywords/symmetric_crypto |  |  | 
                            
                                | pdf_data/cert_keywords/asymmetric_crypto |  |  | 
                            
                                | pdf_data/cert_keywords/pq_crypto |  |  | 
                            
                                | pdf_data/cert_keywords/hash_function |  |  | 
                            
                                | pdf_data/cert_keywords/crypto_scheme |  |  | 
                            
                                | pdf_data/cert_keywords/crypto_protocol |  |  | 
                            
                                | pdf_data/cert_keywords/randomness |  |  | 
                            
                                | pdf_data/cert_keywords/cipher_mode |  |  | 
                            
                                | pdf_data/cert_keywords/ecc_curve |  |  | 
                            
                                | pdf_data/cert_keywords/crypto_engine |  |  | 
                            
                                | pdf_data/cert_keywords/tls_cipher_suite |  |  | 
                            
                                | pdf_data/cert_keywords/crypto_library |  |  | 
                            
                                | pdf_data/cert_keywords/vulnerability |  |  | 
                            
                                | pdf_data/cert_keywords/side_channel_analysis |  |  | 
                            
                                | pdf_data/cert_keywords/technical_report_id |  |  | 
                            
                                | pdf_data/cert_keywords/device_model |  |  | 
                            
                                | pdf_data/cert_keywords/tee_name |  |  | 
                            
                                | pdf_data/cert_keywords/os_name |  |  | 
                            
                                | pdf_data/cert_keywords/cplc_data |  |  | 
                            
                                | pdf_data/cert_keywords/ic_data_group |  |  | 
                            
                                | pdf_data/cert_keywords/standard_id |  |  | 
                            
                                | pdf_data/cert_keywords/javacard_version |  |  | 
                            
                                | pdf_data/cert_keywords/javacard_api_const |  |  | 
                            
                                | pdf_data/cert_keywords/javacard_packages |  |  | 
                            
                                | pdf_data/cert_keywords/certification_process |  |  | 
                            
                                | pdf_data/cert_metadata |  |  | 
                            
                                | pdf_data/report_filename | 0973a_pdf.pdf | 0829a_pdf.pdf | 
                            
                                | pdf_data/report_frontpage | DE: cc_security_level: Common Criteria Part 3 conformant P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 SOGIS Recognition Agreementcc_version: PP conformant plus product specific extensions Common Criteria Part 2 extendedcert_id: BSI-DSZ-CC-0973-2016cert_item: NXP Secure Smart Card Controller P6022y VB including IC Dedicated Softwarecert_lab: BSIdeveloper: NXP Semiconductors Germany GmbHmatch_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
 | DE: cert_id: BSI-DSZ-CC-0829-2012cert_item: Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated softwarecert_lab: BSIdeveloper: Infineon Technologies AGmatch_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
 | 
                            
                                | pdf_data/report_keywords/cc_cert_id |  | DE: BSI-DSZ-CC-0728-2011: 3BSI-DSZ-CC-0829-2012: 24
 | 
                            
                                | pdf_data/report_keywords/cc_protection_profile_id |  |  | 
                            
                                | pdf_data/report_keywords/cc_security_level | EAL: EAL 1: 7EAL 2: 7EAL 3: 4EAL 4: 6EAL 5: 14EAL 5 augmented: 3EAL 5+: 1EAL 6: 5EAL 7: 4EAL5: 3EAL6: 5EAL6 augmented: 3
ITSEC: 
 | EAL: EAL 4: 3EAL 5: 6EAL 5 augmented: 3EAL1: 7EAL2: 3EAL3: 4EAL4: 8EAL5: 6EAL5+: 1EAL6: 4EAL7: 4
ITSEC: 
 | 
                            
                                | pdf_data/report_keywords/cc_sar | ADV: ADV_ARC: 1ADV_ARC.1: 1ADV_FSP: 1ADV_FSP.1: 1ADV_FSP.2: 1ADV_FSP.3: 1ADV_FSP.4: 1ADV_FSP.5: 3ADV_FSP.6: 1ADV_IMP: 1ADV_IMP.1: 1ADV_IMP.2: 2ADV_INT: 1ADV_INT.1: 1ADV_INT.2: 2ADV_INT.3: 2ADV_SPM: 1ADV_SPM.1: 2ADV_TDS: 1ADV_TDS.1: 1ADV_TDS.2: 1ADV_TDS.3: 1ADV_TDS.4: 2ADV_TDS.5: 2ADV_TDS.6: 1
AGD: AGD_OPE: 1AGD_OPE.1: 1AGD_PRE: 1AGD_PRE.1: 1
ALC: ALC_CMC: 1ALC_CMC.1: 1ALC_CMC.2: 1ALC_CMC.3: 1ALC_CMC.4: 2ALC_CMC.5: 3ALC_CMS: 1ALC_CMS.1: 1ALC_CMS.2: 1ALC_CMS.3: 1ALC_CMS.4: 1ALC_CMS.5: 5ALC_DEL: 1ALC_DEL.1: 3ALC_DVS: 1ALC_DVS.1: 1ALC_DVS.2: 9ALC_FLR: 3ALC_FLR.1: 6ALC_FLR.2: 1ALC_FLR.3: 1ALC_LCD.1: 3ALC_LCD.2: 1ALC_TAT: 1ALC_TAT.1: 1ALC_TAT.2: 3ALC_TAT.3: 3
APE: APE_CCL.1: 1APE_ECD.1: 1APE_INT.1: 1APE_OBJ.1: 1APE_OBJ.2: 1APE_REQ.1: 1APE_REQ.2: 1APE_SPD.1: 1
ASE: ASE_CCL: 1ASE_CCL.1: 1ASE_ECD: 1ASE_ECD.1: 1ASE_INT: 1ASE_INT.1: 1ASE_OBJ: 1ASE_OBJ.1: 1ASE_OBJ.2: 1ASE_REQ.1: 1ASE_REQ.2: 1ASE_SPD: 1ASE_SPD.1: 1ASE_TSS: 1ASE_TSS.1: 1ASE_TSS.2: 9
ATE: ATE_COV: 1ATE_COV.1: 1ATE_COV.2: 1ATE_COV.3: 2ATE_DPT: 1ATE_DPT.1: 1ATE_DPT.2: 1ATE_DPT.3: 3ATE_DPT.4: 1ATE_FUN: 2ATE_FUN.1: 1ATE_FUN.2: 2ATE_IND: 2ATE_IND.1: 1ATE_IND.2: 1ATE_IND.3: 1
AVA: AVA_VAN: 3AVA_VAN.1: 1AVA_VAN.2: 1AVA_VAN.3: 1AVA_VAN.4: 1AVA_VAN.5: 7
 | ADV: ADV_ARC: 1ADV_ARC.1: 1ADV_FSP: 1ADV_FSP.1: 1ADV_FSP.2: 1ADV_FSP.3: 1ADV_FSP.4: 1ADV_FSP.5: 2ADV_FSP.6: 1ADV_IMP: 1ADV_IMP.1: 1ADV_IMP.2: 1ADV_INT: 1ADV_INT.1: 1ADV_INT.2: 2ADV_INT.3: 1ADV_SPM: 1ADV_SPM.1: 1ADV_TDS: 1ADV_TDS.1: 1ADV_TDS.2: 1ADV_TDS.3: 1ADV_TDS.4: 2ADV_TDS.5: 1ADV_TDS.6: 1
AGD: AGD_OPE: 1AGD_OPE.1: 1AGD_PRE: 1AGD_PRE.1: 1
ALC: ALC_CMC: 1ALC_CMC.1: 1ALC_CMC.2: 1ALC_CMC.3: 1ALC_CMC.4: 2ALC_CMC.5: 1ALC_CMS: 1ALC_CMS.1: 1ALC_CMS.2: 1ALC_CMS.3: 1ALC_CMS.4: 1ALC_CMS.5: 3ALC_DEL: 1ALC_DEL.1: 2ALC_DVS: 1ALC_DVS.1: 1ALC_DVS.2: 7ALC_FLR: 1ALC_FLR.1: 1ALC_FLR.2: 1ALC_FLR.3: 1ALC_LCD.1: 2ALC_LCD.2: 1ALC_TAT: 1ALC_TAT.1: 1ALC_TAT.2: 3ALC_TAT.3: 1
APE: APE_CCL.1: 1APE_ECD.1: 1APE_INT.1: 1APE_OBJ.1: 1APE_OBJ.2: 1APE_REQ.1: 1APE_REQ.2: 1APE_SPD.1: 1
ASE: ASE_CCL: 1ASE_CCL.1: 1ASE_ECD: 1ASE_ECD.1: 1ASE_INT: 1ASE_INT.1: 1ASE_OBJ: 1ASE_OBJ.1: 1ASE_OBJ.2: 1ASE_REQ.1: 1ASE_REQ.2: 1ASE_SPD: 1ASE_SPD.1: 1ASE_TSS: 1ASE_TSS.1: 1ASE_TSS.2: 1
ATE: ATE_COV: 1ATE_COV.1: 1ATE_COV.2: 1ATE_COV.3: 1ATE_DPT: 1ATE_DPT.1: 1ATE_DPT.2: 1ATE_DPT.3: 2ATE_DPT.4: 1ATE_FUN: 1ATE_FUN.1: 1ATE_FUN.2: 1ATE_IND: 1ATE_IND.1: 1ATE_IND.2: 1ATE_IND.3: 1
AVA: AVA_VAN: 2AVA_VAN.1: 1AVA_VAN.2: 1AVA_VAN.3: 1AVA_VAN.4: 1AVA_VAN.5: 6
 | 
                            
                                | pdf_data/report_keywords/cc_sfr |  |  | 
                            
                                | pdf_data/report_keywords/cc_claims |  |  | 
                            
                                | pdf_data/report_keywords/vendor | NXP: NXP: 26NXP Semiconductors: 36
 | GD: Infineon: Infineon: 14Infineon Technologies: 8Infineon Technologies AG: 18
 | 
                            
                                | pdf_data/report_keywords/eval_facility | TUV: TÜV Informationstechnik: 4TÜViT: 1
 | TUV: TÜV Informationstechnik: 4
 | 
                            
                                | pdf_data/report_keywords/symmetric_crypto | AES_competition: DES: constructions: 
 | AES_competition: DES: constructions: 
 | 
                            
                                | pdf_data/report_keywords/asymmetric_crypto |  | ECC: RSA: RSA 1024: 1RSA-2048: 1RSA2048: 2RSA4096: 2
 | 
                            
                                | pdf_data/report_keywords/pq_crypto |  |  | 
                            
                                | pdf_data/report_keywords/hash_function |  |  | 
                            
                                | pdf_data/report_keywords/crypto_scheme |  |  | 
                            
                                | pdf_data/report_keywords/crypto_protocol |  |  | 
                            
                                | pdf_data/report_keywords/randomness |  |  | 
                            
                                | pdf_data/report_keywords/cipher_mode |  |  | 
                            
                                | pdf_data/report_keywords/ecc_curve |  |  | 
                            
                                | pdf_data/report_keywords/crypto_engine |  |  | 
                            
                                | pdf_data/report_keywords/tls_cipher_suite |  |  | 
                            
                                | pdf_data/report_keywords/crypto_library |  |  | 
                            
                                | pdf_data/report_keywords/vulnerability |  |  | 
                            
                                | pdf_data/report_keywords/side_channel_analysis | SCA: DPA: 1SPA: 1physical probing: 1
other: 
 | FI: DFA: 5physical tampering: 1
SCA: DPA: 6SPA: 5physical probing: 1
other: 
 | 
                            
                                | pdf_data/report_keywords/technical_report_id | BSI: BSI 7148: 1BSI TR-02102: 1
 | BSI: BSI 7125: 2BSI 7148: 1BSI TR-02102: 1
 | 
                            
                                | pdf_data/report_keywords/device_model |  |  | 
                            
                                | pdf_data/report_keywords/tee_name |  |  | 
                            
                                | pdf_data/report_keywords/os_name |  |  | 
                            
                                | pdf_data/report_keywords/cplc_data |  |  | 
                            
                                | pdf_data/report_keywords/ic_data_group |  |  | 
                            
                                | pdf_data/report_keywords/standard_id | BSI: AIS 25: 2AIS 26: 1AIS 31: 2AIS 32: 1AIS 34: 2AIS 35: 2AIS 36: 1AIS 37: 1AIS31: 1
ISO: ISO/IEC 14443: 6ISO/IEC 15408: 4ISO/IEC 17065: 2ISO/IEC 18045: 4ISO/IEC 7816: 2
NIST: 
 | BSI: AIS 25: 2AIS 26: 2AIS 31: 2AIS 32: 1AIS 34: 2AIS 35: 1AIS 36: 3AIS 38: 1AIS31: 1AIS47: 1
ISO: 
 | 
                            
                                | pdf_data/report_keywords/javacard_version |  |  | 
                            
                                | pdf_data/report_keywords/javacard_api_const |  |  | 
                            
                                | pdf_data/report_keywords/javacard_packages |  |  | 
                            
                                | pdf_data/report_keywords/certification_process | ConfidentialDocument:  TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 11.11, 2016-06-14, NXP Secure Smart Card Controller P6022y VB Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 2, 2016-06-14, EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1Evaluation (ETR COMP) for the P6022y VB, version 2, 2016-06-14, TÜV Informationstechnik GmbH (confidential document) [11] Product Data Sheet - SmartMX2 family P6022y VB, Secure high-performance smart card controller: 1being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
 | ConfidentialDocument: A11 and M11, Version 3, 2012-08-28, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product M7820 A11 and M11, Version 3: 1TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [10] Configuration Management Scope M7820 A11 and M11 including optional Software Libraries RSA –: 1– SHA-2 – Toolbox, Version 1.1, 2012-06-29, Infineon Technologies AG (confidential document) [11] M7801/M7820 Controller Security Guidelines, 2012-05-07, Infineon Technologies AG [12] SLx 70: 1
 | 
                            
                                | pdf_data/report_metadata | /Author: Bundesamt für Sicherheit in der Informationstechnik/CreationDate: D:20160622114257+02'00'/Creator: Writer/Keywords: "Common Criteria, Certification, Zertifizierung, Smart Card, NXP Semiconductors Germany GmbH, NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software"/ModDate: D:20160622115419+02'00'/Producer: LibreOffice 4.2/Subject: Common Criteria Certification/Title: Certification Report BSI-DSZ-CC-0973-2016pdf_file_size_bytes: 1426168pdf_hyperlinks: https://www.bsi.bund.de/, https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreportepdf_is_encrypted: Falsepdf_number_of_pages: 44
 | /Author: Bundesamt für Sicherheit in der Informationstechnik/CreationDate: D:20120912093345+02'00'/Creator: Writer/Keywords: "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software, Infineon Technologies AG"/ModDate: D:20120912093725+02'00'/Producer: LibreOffice 3.5/Subject: Common Criteria Certification/Title: Certification Report BSI-DSZ-CC-0829-2012pdf_file_size_bytes: 1362115pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/pdf_is_encrypted: Falsepdf_number_of_pages: 46
 | 
                            
                                | pdf_data/st_filename | 0973b_pdf.pdf | 0829b_pdf.pdf | 
                            
                                | pdf_data/st_frontpage |  |  | 
                            
                                | pdf_data/st_keywords/cc_cert_id |  | DE: BSI-DSZ-CC-0695-2011: 1BSI-DSZ-CC-0813-2012: 1
NL: 
 | 
                            
                                | pdf_data/st_keywords/cc_protection_profile_id |  |  | 
                            
                                | pdf_data/st_keywords/cc_security_level | EAL: EAL4: 1EAL4 augmented: 1EAL4+: 3EAL5: 38EAL5 augmented: 2EAL5+: 18EAL6: 42EAL6 augmented: 4EAL6+: 13
 | EAL: EAL 5: 3EAL 5 augmented: 3EAL5: 5EAL5 augmented: 1
 | 
                            
                                | pdf_data/st_keywords/cc_sar | ADV: ADV_ARC: 2ADV_ARC.1: 2ADV_FSP: 8ADV_FSP.4: 6ADV_FSP.5: 22ADV_IMP: 2ADV_IMP.1: 1ADV_IMP.2: 4ADV_INT.2: 1ADV_INT.3: 1ADV_SPM: 2ADV_SPM.1: 1ADV_TDS.4: 1ADV_TDS.5: 1
AGD: AGD_OPE: 2AGD_OPE.1: 2AGD_PRE: 2AGD_PRE.1: 2
ALC: ALC_CMC: 5ALC_CMC.4: 4ALC_CMC.5: 4ALC_CMS: 8ALC_CMS.4: 6ALC_CMS.5: 10ALC_DEL: 2ALC_DEL.1: 2ALC_DVS: 2ALC_DVS.2: 5ALC_FLR.1: 6ALC_LCD.1: 2ALC_TAT.2: 1ALC_TAT.3: 1
ASE: ASE_CCL.1: 2ASE_ECD.1: 2ASE_INT.1: 2ASE_OBJ.2: 2ASE_REQ.2: 2ASE_SPD.1: 2ASE_TSS: 2ASE_TSS.2: 10
ATE: ATE_COV: 2ATE_COV.2: 1ATE_COV.3: 4ATE_DPT.3: 2ATE_FUN.1: 1ATE_FUN.2: 1ATE_IND.2: 2
AVA: 
 | ADV: ADV_ARC.1: 2ADV_FSP: 1ADV_FSP.2: 1ADV_FSP.4: 1ADV_FSP.5: 3ADV_IMP.1: 2ADV_INT.2: 1ADV_TDS.3: 1ADV_TDS.4: 1
AGD: AGD_OPE.1: 2AGD_PRE.1: 2
ALC: ALC_CMC.4: 1ALC_CMS: 1ALC_CMS.4: 1ALC_CMS.5: 3ALC_DEL.1: 1ALC_DVS: 1ALC_DVS.1: 1ALC_DVS.2: 9ALC_LCD.1: 1ALC_TAT.2: 1
ASE: ASE_CCL: 2ASE_CCL.1: 1ASE_ECD: 2ASE_ECD.1: 1ASE_INT: 2ASE_INT.1: 1ASE_OBJ: 2ASE_OBJ.2: 1ASE_REQ: 2ASE_REQ.2: 1ASE_SPD: 2ASE_SPD.1: 1ASE_TSS: 2ASE_TSS.1: 1
ATE: ATE_COV.2: 1ATE_DPT.3: 1ATE_FUN.1: 1ATE_IND.2: 1
AVA: 
 | 
                            
                                | pdf_data/st_keywords/cc_sfr | FAU: FAU_SAS.1: 7FAU_SAS.1.1: 1
FCS: FCS_CKM.1: 34FCS_CKM.1.1: 1FCS_CKM.2: 2FCS_CKM.4: 65FCS_CKM.4.1: 5FCS_COP.1: 88FCS_COP.1.1: 7FCS_RNG.1: 8FCS_RNG.1.1: 3FCS_RNG.1.2: 2
FDP: FDP_ACC.1: 76FDP_ACC.1.1: 4FDP_ACF.1: 58FDP_ACF.1.1: 4FDP_ACF.1.2: 4FDP_ACF.1.3: 4FDP_ACF.1.4: 4FDP_IFC.1: 20FDP_ITC.1: 24FDP_ITC.2: 44FDP_ITC.2.1: 2FDP_ITC.2.2: 2FDP_ITC.2.3: 2FDP_ITC.2.4: 2FDP_ITC.2.5: 2FDP_ITT.1: 6FDP_ROL.1: 7FDP_ROL.1.1: 1FDP_ROL.1.2: 1FDP_SDC.1: 16FDP_SDC.1.1: 2FDP_SDI.1: 5FDP_SDI.2: 36FDP_SDI.2.1: 5FDP_SDI.2.2: 5
FIA: FIA_UAU.1: 2FIA_UAU.2: 15FIA_UAU.5: 13FIA_UAU.5.1: 2FIA_UAU.5.2: 2FIA_UID.1: 10FIA_UID.2: 17
FMT: FMT_LIM.1: 3FMT_LIM.2: 4FMT_MSA.1: 53FMT_MSA.1.1: 4FMT_MSA.3: 48FMT_MSA.3.1: 4FMT_MSA.3.2: 4FMT_SMF.1: 45FMT_SMF.1.1: 3FMT_SMR.1: 33FMT_SMR.1.1: 2FMT_SMR.1.2: 2
FPT: FPT_FLS.1: 8FPT_ITT.1: 6FPT_PHP.3: 8FPT_RPL.1: 16FPT_RPL.1.1: 2FPT_RPL.1.2: 2FPT_TDC.1: 19FPT_TDC.1.1: 2FPT_TDC.1.2: 2
FRU: FTP: FTP_ITC.1: 4FTP_ROL.1: 1FTP_TRP.1: 26FTP_TRP.1.1: 2FTP_TRP.1.2: 2FTP_TRP.1.3: 7
 | FAU: FAU_GEN: 1FAU_SAS: 4FAU_SAS.1: 10FAU_SAS.1.1: 1
FCS: FCS_CKM: 24FCS_CKM.1: 34FCS_CKM.2: 5FCS_CKM.4: 24FCS_COP: 58FCS_COP.1: 28FCS_RNG: 13FCS_RNG.1: 29FCS_RNG.1.1: 1FCS_RNG.1.2: 1
FDP: FDP_ACC.1: 25FDP_ACC.1.1: 1FDP_ACF.1: 22FDP_ACF.1.1: 1FDP_ACF.1.2: 1FDP_ACF.1.3: 1FDP_ACF.1.4: 1FDP_IFC.1: 15FDP_ITC.1: 18FDP_ITC.2: 18FDP_ITT.1: 18FDP_SDI.1: 17FDP_SDI.1.1: 1FDP_SDI.2: 15FDP_SDI.2.1: 2FDP_SDI.2.2: 2
FIA: FIA_SOS.2: 3FIA_SOS.2.1: 1FIA_SOS.2.2: 2
FMT: FMT_CKM.4: 1FMT_LIM: 3FMT_LIM.1: 7FMT_LIM.2: 7FMT_MSA.1: 20FMT_MSA.1.1: 1FMT_MSA.2: 1FMT_MSA.3: 21FMT_MSA.3.1: 1FMT_MSA.3.2: 1FMT_SMF.1: 16FMT_SMF.1.1: 1FMT_SMR.1: 6
FPT: FPT_AMT.1: 1FPT_FLS.1: 19FPT_ITT.1: 16FPT_LIM.2: 1FPT_PHP.3: 25FPT_TST: 7FPT_TST.1: 11FPT_TST.2: 36FPT_TST.2.1: 1
FRU: 
 | 
                            
                                | pdf_data/st_keywords/cc_claims | O: O.ACCESS-: 1O.ACCESS-CONTROL: 8O.AES: 6O.AUTHENTICATION: 7O.CUST_RECONF_MIFARE: 6O.CUST_RECONF_PLAIN: 6O.DF-: 2O.DF-TRANSACTION: 4O.EEPROM_INTEGRITY: 5O.ENCRYPTION: 6O.FM_FW: 9O.MAC: 6O.MEM_ACCESS: 10O.PUF: 6O.RND: 3O.SFR_ACCESS: 9O.TDES: 6O.TYPE-: 2O.TYPE-CONSISTENCY: 4
T: 
 |  | 
                            
                                | pdf_data/st_keywords/vendor | NXP: NXP: 180NXP Semiconductors: 47NXP Semiconductors N.V: 129
 | Infineon: Infineon: 9Infineon Technologies: 7Infineon Technologies AG: 16
 | 
                            
                                | pdf_data/st_keywords/eval_facility |  |  | 
                            
                                | pdf_data/st_keywords/symmetric_crypto | AES_competition: DES: 3DES: TDEA: 1TDES: 54Triple-DES: 30
DES: 
constructions: 
 | AES_competition: DES: constructions: 
 | 
                            
                                | pdf_data/st_keywords/asymmetric_crypto |  | ECC: FF: RSA: RSA-2048: 1RSA2048: 1RSA4096: 1
 | 
                            
                                | pdf_data/st_keywords/pq_crypto |  |  | 
                            
                                | pdf_data/st_keywords/hash_function |  | SHA: SHA2: SHA-2: 61SHA-256: 2SHA-512: 2
 | 
                            
                                | pdf_data/st_keywords/crypto_scheme |  |  | 
                            
                                | pdf_data/st_keywords/crypto_protocol |  |  | 
                            
                                | pdf_data/st_keywords/randomness |  |  | 
                            
                                | pdf_data/st_keywords/cipher_mode |  |  | 
                            
                                | pdf_data/st_keywords/ecc_curve |  |  | 
                            
                                | pdf_data/st_keywords/crypto_engine |  |  | 
                            
                                | pdf_data/st_keywords/tls_cipher_suite |  |  | 
                            
                                | pdf_data/st_keywords/crypto_library |  |  | 
                            
                                | pdf_data/st_keywords/vulnerability |  |  | 
                            
                                | pdf_data/st_keywords/side_channel_analysis | FI: Malfunction: 10fault injection: 2malfunction: 2physical tampering: 1
SCA: DPA: 2Leak-Inherent: 11Physical Probing: 2physical probing: 1side channel: 1timing attacks: 2
 | FI: DFA: 7Malfunction: 12fault induction: 1malfunction: 1
SCA: DPA: 10Leak-Inherent: 10Physical Probing: 2SPA: 5physical probing: 1side channel: 8
 | 
                            
                                | pdf_data/st_keywords/technical_report_id |  |  | 
                            
                                | pdf_data/st_keywords/device_model |  |  | 
                            
                                | pdf_data/st_keywords/tee_name |  |  | 
                            
                                | pdf_data/st_keywords/os_name |  |  | 
                            
                                | pdf_data/st_keywords/cplc_data |  |  | 
                            
                                | pdf_data/st_keywords/ic_data_group |  |  | 
                            
                                | pdf_data/st_keywords/standard_id | BSI: CC: CCMB-2012-09-001: 2CCMB-2012-09-002: 2CCMB-2012-09-003: 2CCMB-2012-09-004: 2
FIPS: FIPS 197: 5FIPS PUB 197: 3
ISO: ISO/IEC 14443: 24ISO/IEC 18092: 2ISO/IEC 7816: 28ISO/IEC 9797-1: 1
NIST: NIST SP 800-38A: 6NIST SP 800-38B: 2NIST SP 800-67: 6
 | BSI: CC: CCMB-2009-07-001: 1CCMB-2009-07-002: 1CCMB-2009-07-003: 2
FIPS: FIPS PUB 180-4: 2FIPS PUB 197: 2
ISO: ISO/IEC 14443: 2ISO/IEC 18092: 6ISO/IEC 7816-3: 1ISO/IEC18092: 6
PKCS: RFC: 
 | 
                            
                                | pdf_data/st_keywords/javacard_version |  |  | 
                            
                                | pdf_data/st_keywords/javacard_api_const |  |  | 
                            
                                | pdf_data/st_keywords/javacard_packages |  |  | 
                            
                                | pdf_data/st_keywords/certification_process |  |  | 
                            
                                | pdf_data/st_metadata | /Author: NXP Semiconductors/CreationDate: D:20160614165343+02'00'/Creator: DITA Open Toolkit/Keywords: CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB/ModDate: D:20160614165719+02'00'/PDFVersion: 1.4/Producer: Apache FOP Version 1.1/Subject: NXP Secure Smart Card Controller P6022y VB/Title: Security Target Litepdf_file_size_bytes: 824420pdf_hyperlinks: {}pdf_is_encrypted: Truepdf_number_of_pages: 129
 | /Author: Hans-Ulrich Buchmüller/CreationDate: D:20120828132014/Creator: Microsoft® Office Word 2007/Keywords: Dresden, Burlington, contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, cryptographic, libraries, CCv3.1/ModDate: D:20120828132014/Producer: Microsoft® Office Word 2007/Subject: Security Target M7892 Integrity Guard/Title: CC EAL5+ Certification Security Targetpdf_file_size_bytes: 889908pdf_hyperlinks: http://www.bsi.bund.de/pdf_is_encrypted: Falsepdf_number_of_pages: 85
 | 
                            
                                | state/cert/convert_garbage | False | False | 
                            
                                | state/cert/convert_ok | False | False | 
                            
                                | state/cert/download_ok | False | False | 
                            
                                | state/cert/extract_ok | False | False | 
                            
                                | state/cert/pdf_hash | Equal | Equal | 
                            
                                | state/cert/txt_hash | Equal | Equal | 
                            
                                | state/report/convert_garbage | False | False | 
                            
                                | state/report/convert_ok | True | True | 
                            
                                | state/report/download_ok | True | True | 
                            
                                | state/report/extract_ok | True | True | 
                            
                                | state/report/pdf_hash | Different | Different | 
                            
                                | state/report/txt_hash | Different | Different | 
                            
                                | state/st/convert_garbage | False | False | 
                            
                                | state/st/convert_ok | True | True | 
                            
                                | state/st/download_ok | True | True | 
                            
                                | state/st/extract_ok | True | True | 
                            
                                | state/st/pdf_hash | Different | Different | 
                            
                                | state/st/txt_hash | Different | Different |