Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software
BSI-DSZ-CC-0978-2016
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Toolbox, Base, FTL, SCL, HCL, and PSL, and with specific IC dedicated software
BSI-DSZ-CC-0827-V7-2018
name NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Toolbox, Base, FTL, SCL, HCL, and PSL, and with specific IC dedicated software
not_valid_before 2016-02-05 2018-09-14
not_valid_after 2021-02-05 2023-09-14
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0978b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V7b_pdf.pdf
manufacturer NXP Semiconductors Germany GmbH Business Line Identification Infineon Technologies AG
manufacturer_web https://www.nxp.com https://www.infineon.com/
security_level ALC_FLR.1, ASE_TSS.2, EAL6+ EAL5+, AVA_VAN.5, ALC_DVS.2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0978a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V7a_pdf.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V7c_pdf.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2018, 8, 17), 'maintenance_title': 'NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0978V2ma1a_pdf.pdf', 'maintenance_st_link': None})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None f1dbd4097e02ec79fa2993180b40000d518eeb43726e4386f1db1c09872bc5f4
state/cert/txt_hash None 849e4114033fcfcf29a6b6b4b7cb96e3a563aa5a7c291e342325d99882e5ca60
state/report/pdf_hash be3fc3fa8851f16aa02445b6d43a0d05dcae3aded916d5ca0ddefc07200624f2 264649932f6805a7ce28eaa80ef4e26793fb414766f5f2d43bef87988a8774ae
state/report/txt_hash 532d223e7b93839f1b0a634a1edcfe27691bb9bbb5e1cfa704437449643cf98a 436c60584b39b6191aa5f0fba3c131306ceffa8fe01c091bf7f3bb13be52ed87
state/st/pdf_hash 21e2fdbc441003344f6bfb846d02418402eebcf5bf09d26d33adac2a0348fcb3 0d62fc9e8c2c38d1f526a581a4b5bfab73b6a0785115ed3999d3c1d970f6d4aa
state/st/txt_hash e89fa1f8b114250cfe1c97b48bf1d36845b6f05a4f72addb81cb1aec7134b617 b0b6acc7d1748091818730ff57b4d743202f53c28a95a01d7821c37b5d491588
heuristics/cert_id BSI-DSZ-CC-0978-2016 BSI-DSZ-CC-0827-V7-2018
heuristics/report_references/directly_referenced_by ANSSI-CC-2016/52, ANSSI-CC-2016/51, BSI-DSZ-CC-0817-V2-2016, ANSSI-CC-2016/27, BSI-DSZ-CC-0957-V2-2016, ANSSI-CC-2016/26, ANSSI-CC-2016/49, ANSSI-CC-2016/39, ANSSI-CC-2016/40, ANSSI-CC-2016/50, ANSSI-CC-2016/38, ANSSI-CC-2016/29, BSI-DSZ-CC-0978-V2-2017, ANSSI-CC-2016/41, ANSSI-CC-2016/28, BSI-DSZ-CC-0809-V2-2016, ANSSI-CC-2016/30, BSI-DSZ-CC-0808-V2-2016 BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1069-2018
heuristics/report_references/directly_referencing None BSI-DSZ-CC-0827-V6-2017
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2016/39, BSI-DSZ-CC-0978-V2-2017, BSI-DSZ-CC-0831-V6-2023, BSI-DSZ-CC-0809-V3-2017, ANSSI-CC-2016/40, ANSSI-CC-2016/49, BSI-DSZ-CC-0918-V5-2023, ANSSI-CC-2016/28, BSI-DSZ-CC-0831-V3-2021, ANSSI-CC-2016/30, BSI-DSZ-CC-0809-V2-2016, BSI-DSZ-CC-0919-V3-2023, BSI-DSZ-CC-1035-2017, BSI-DSZ-CC-0957-V2-2016, ANSSI-CC-2016/26, ANSSI-CC-2016/50, BSI-DSZ-CC-0808-V3-2017, ANSSI-CC-2016/29, ANSSI-CC-2016/41, BSI-DSZ-CC-0918-V4-2022, BSI-DSZ-CC-0831-V5-2022, BSI-DSZ-CC-0808-V2-2016, ANSSI-CC-2016/52, ANSSI-CC-2016/51, BSI-DSZ-CC-0831-V7-2023, BSI-DSZ-CC-0817-V2-2016, ANSSI-CC-2016/27, BSI-DSZ-CC-0831-V2-2020, BSI-DSZ-CC-0919-V2-2021, ANSSI-CC-2016/38, BSI-DSZ-CC-0831-V4-2021, BSI-DSZ-CC-0978-V3-2019, BSI-DSZ-CC-0918-V6-2024 BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0827-V8-2020
heuristics/report_references/indirectly_referencing None BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0791-2012, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-V5-2017
heuristics/st_references/directly_referenced_by ANSSI-CC-2016/52, ANSSI-CC-2016/51, BSI-DSZ-CC-0957-V2-2016, ANSSI-CC-2016/49, ANSSI-CC-2016/39, ANSSI-CC-2016/40, ANSSI-CC-2016/50, ANSSI-CC-2016/38, ANSSI-CC-2016/41 None
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2016/39, BSI-DSZ-CC-0822-V5-2023, BSI-DSZ-CC-0822-V4-2023, ANSSI-CC-2016/40, ANSSI-CC-2016/49, BSI-DSZ-CC-0918-V5-2023, BSI-DSZ-CC-0919-V3-2023, BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0918-V3-2022, ANSSI-CC-2016/50, BSI-DSZ-CC-0918-V2-2021, ANSSI-CC-2016/41, BSI-DSZ-CC-0918-V4-2022, ANSSI-CC-2016/52, ANSSI-CC-2016/51, BSI-DSZ-CC-0918-2020, BSI-DSZ-CC-0919-V2-2021, ANSSI-CC-2016/38, BSI-DSZ-CC-0918-V6-2024 None
pdf_data/cert_filename None 0827V7c_pdf.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • DE:
      • BSI-DSZ-CC-0827-V7-2018: 1
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0035-2007: 1
  • cc_security_level:
    • EAL:
      • EAL 5: 2
      • EAL 2: 1
      • EAL 5 augmented: 1
  • cc_sar:
    • ALC:
      • ALC_DVS.2: 1
      • ALC_FLR: 1
    • AVA:
      • AVA_VAN.5: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
    • Infineon:
      • Infineon Technologies: 1
      • Infineon Technologies AG: 1
  • eval_facility:
  • symmetric_crypto:
  • asymmetric_crypto:
    • RSA:
      • RSA2048: 1
      • RSA4096: 1
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
    • ISO:
      • ISO/IEC 15408: 2
      • ISO/IEC 18045: 2
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 337795
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20180920084420+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, SecurityIC, Infineon, 0827-V7, BSI-CC, M990x"
  • /ModDate: D:20180920091629+02'00'
  • /Producer: LibreOffice 5.2
  • /Title: Certification Report BSI-DSZ-CC-0827-V7-2018
  • pdf_hyperlinks:
pdf_data/report_filename 0978a_pdf.pdf 0827V7a_pdf.pdf
pdf_data/report_frontpage/DE/cc_security_level Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1 SOGIS Recognition Agreement Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0978-2016 BSI-DSZ-CC-0827-V7-2018
pdf_data/report_frontpage/DE/cert_item NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Toolbox, Base, FTL, SCL, HCL, and PSL, and with specific IC dedicated software
pdf_data/report_frontpage/DE/developer NXP Semiconductors Germany GmbH Infineon Technologies AG
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 11
    • RSA4096: 11
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
    • ECC:
      • ECC: 8
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0978-2016: 22
  • BSI-DSZ-CC-0978: 2
  • BSI-DSZ-CC-0827-V7-2018: 21
  • BSI-DSZ-CC-0827-V6-2017: 3
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 7
  • R:
    • R.O: 7
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0035-2007: 4
  • BSI-CC-PP-0035-2007: 2
  • BSI-CC-PP- 0035-2007: 1
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0035-2007 4 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 2
    • ADV_IMP.2: 2
    • ADV_INT.3: 2
    • ADV_SPM.1: 2
    • ADV_TDS.5: 2
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 6
    • ALC_FLR: 3
    • ALC_CMC.5: 3
    • ALC_CMS.5: 3
    • ALC_DVS.2: 3
    • ALC_TAT.3: 3
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.3: 2
    • ATE_DPT.3: 2
    • ATE_FUN.2: 2
    • ATE_FUN: 3
    • ATE_IND: 2
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
  • AVA:
    • AVA_VAN.5: 2
    • AVA_VAN: 3
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_TSS.2: 6
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ALC:
    • ALC_DVS.2: 5
    • ALC_FLR: 3
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • AVA:
    • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.1: 6
  • ALC_FLR: 3
  • ALC_CMC.5: 3
  • ALC_CMS.5: 3
  • ALC_DVS.2: 3
  • ALC_TAT.3: 3
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 1
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 2
  • ALC_DVS.1: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 2
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_TAT.2: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_DVS.2: 5
  • ALC_FLR: 3
  • ALC_CMC.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 3 5
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 2 1
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.5: 2
  • AVA_VAN: 3
  • AVA_VAN.1: 1
  • AVA_VAN.2: 1
  • AVA_VAN.3: 1
  • AVA_VAN.4: 1
  • AVA_VAN.5: 4
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 2 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 6: 8
    • EAL 5: 9
    • EAL 2: 7
    • EAL 1: 7
    • EAL 4: 6
    • EAL5: 1
    • EAL 5+: 1
    • EAL 3: 4
    • EAL 7: 4
    • EAL 6 augmented: 3
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 5: 8
    • EAL 2: 2
    • EAL 1: 1
    • EAL 4: 1
    • EAL 2+: 1
    • EAL5+: 1
    • EAL6: 1
    • EAL 5 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 6: 8
  • EAL 5: 9
  • EAL 2: 7
  • EAL 1: 7
  • EAL 4: 6
  • EAL5: 1
  • EAL 5+: 1
  • EAL 3: 4
  • EAL 7: 4
  • EAL 6 augmented: 3
  • EAL 5: 8
  • EAL 2: 2
  • EAL 1: 1
  • EAL 4: 1
  • EAL 2+: 1
  • EAL5+: 1
  • EAL6: 1
  • EAL 5 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 7 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 7 2
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 6 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 9 8
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, NXP Semiconductors, Version 2.61, 14 October 2015 (confidential document) [7] Evaluation Technical Report, NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE: 1
    • IC Dedicated Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [9: 1
    • Certification Report Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [11] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Configuration List,NXP: 1
    • Version 2.7, 25 September 2015 (confidential document) [12] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Evaluation Reference List, NXP: 1
    • Version 1.4, 11 September 2015 (confidential document) [13] Product data sheet SmartMX2 family P60x080/144 VA/VE, Secure high-performance smart card: 1
    • NXP Semiconductors Document Number 1658**, NXP Semiconductors, Version 5.4, 14 August 2015 (confidential document) [14] Instruction Set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors: 1
    • Number 1478**, NXP Semiconductors, Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60x080/144P VA/VE: 1
    • Semiconductors, NXP Semiconductors, Version 2.7, 12 November 2015 (confidential document) [16] Product data sheet addendum: SmartMX2 family P60D080/144 VA/VE and P60C080/144 VA/VE: 1
    • NXP Semiconductors, Document Number 1569**, NXP Semiconductors, Version 3.7, 21 May 2014 (confidential document) [17] Product data sheet addendum: SmartMX2 family Post Delivery Configuration (PDC), NXP: 1
    • Document Number 2250** ,NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors: 1
    • Number 2244**, NXP Semiconductors, Version 3.1, 01 October 2014 (confidential document) [19] Product data sheet addendum: SmartMX2 family Firmware Interface Specification (FIS), NXP: 1
    • Document Number 2333**, NXP Semiconductors, Version 4.2, 24 June 2015 (confidential document) [20] Product data sheet SmartMX2 family P60N144 VA, Secure high-performance smart card controller: 1
    • Semiconductors, Document Number 2408**, NXP Semiconductors, Version 3.2, 14 August 2014 (confidential document) [21] Product data sheet addendum: SmartMX2 family P60N144 VA/VE, Wafer and delivery specification: 1
    • Semiconductors, Document Number 2414**, NXP Semiconductors, Version 3.2, 06 June 2015 (confidential document) [22] Order Entry Form, P60C144, NXP Semiconductors, Version 3.2, 06 October 2015 [23] Order Entry: 1
  • OutOfScope:
    • out of scope: 2
    • patch in NVM). 5 FW Mifare-compatible Reader Mode Support Library (out of scope of evaluation: 1
    • patch in NVM). Optional. 6 FW Management of Mifare- compatible Cards Library (out of scope of evaluation: 1
    • area of the ROM on the IC (patch in NVM). 5 FW Mifare-compatible Reader Mode Support Library (out of scope of evaluation) 01.02.0800 Stored in reserved area of the ROM on the IC (patch in NVM). Optional. 6: 1
    • Management of Mifare- compatible Cards Library (out of scope of evaluation) 01.03.0927, 01.04.1275 Stored in reserved area of the ROM on the IC (patch in NVM: 1
  • ConfidentialDocument:
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • Target M9900, M9905, M9906 including optional Software Libraries RSA-EC-SCL-HCL-PSL”, Infineon (confidential document) [7] Evaluation Technical Report, BSI-DSZ-CC-0827-V7-2018 Version 2, 2018-08-21, “EVALUATION: 1
    • REPORT SUMMARY (ETR SUMMARY)”, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [9: 1
    • “EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, v1.4, 2018-06-06, “Configuration Management Scope M9900: 1
    • M9906 including optional Software Libraries RSA-EC-SCL-PSL”, Infineon (confidential document) [12] M9900 Security Guidelines User’s Manual, 2018-07-03, Infineon [13] SLE97 M9900 Hardware: 1
    • ADV, Cryptographic Standards Compliance Verification, v1, 2018-06-22, TÜV Informationstechnik GmbH (confidential document) 30 / 34 BSI-DSZ-CC-0827-V7-2018 Certification Report C. Excerpts from the Criteria For the: 1
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, NXP Semiconductors, Version 2.61, 14 October 2015 (confidential document) [7] Evaluation Technical Report, NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE: 1
  • IC Dedicated Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [9: 1
  • Certification Report Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [11] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Configuration List,NXP: 1
  • Version 2.7, 25 September 2015 (confidential document) [12] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Evaluation Reference List, NXP: 1
  • Version 1.4, 11 September 2015 (confidential document) [13] Product data sheet SmartMX2 family P60x080/144 VA/VE, Secure high-performance smart card: 1
  • NXP Semiconductors Document Number 1658**, NXP Semiconductors, Version 5.4, 14 August 2015 (confidential document) [14] Instruction Set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors: 1
  • Number 1478**, NXP Semiconductors, Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60x080/144P VA/VE: 1
  • Semiconductors, NXP Semiconductors, Version 2.7, 12 November 2015 (confidential document) [16] Product data sheet addendum: SmartMX2 family P60D080/144 VA/VE and P60C080/144 VA/VE: 1
  • NXP Semiconductors, Document Number 1569**, NXP Semiconductors, Version 3.7, 21 May 2014 (confidential document) [17] Product data sheet addendum: SmartMX2 family Post Delivery Configuration (PDC), NXP: 1
  • Document Number 2250** ,NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors: 1
  • Number 2244**, NXP Semiconductors, Version 3.1, 01 October 2014 (confidential document) [19] Product data sheet addendum: SmartMX2 family Firmware Interface Specification (FIS), NXP: 1
  • Document Number 2333**, NXP Semiconductors, Version 4.2, 24 June 2015 (confidential document) [20] Product data sheet SmartMX2 family P60N144 VA, Secure high-performance smart card controller: 1
  • Semiconductors, Document Number 2408**, NXP Semiconductors, Version 3.2, 14 August 2014 (confidential document) [21] Product data sheet addendum: SmartMX2 family P60N144 VA/VE, Wafer and delivery specification: 1
  • Semiconductors, Document Number 2414**, NXP Semiconductors, Version 3.2, 06 June 2015 (confidential document) [22] Order Entry Form, P60C144, NXP Semiconductors, Version 3.2, 06 October 2015 [23] Order Entry: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • Target M9900, M9905, M9906 including optional Software Libraries RSA-EC-SCL-HCL-PSL”, Infineon (confidential document) [7] Evaluation Technical Report, BSI-DSZ-CC-0827-V7-2018 Version 2, 2018-08-21, “EVALUATION: 1
  • REPORT SUMMARY (ETR SUMMARY)”, TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [9: 1
  • “EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP)”, TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE, v1.4, 2018-06-06, “Configuration Management Scope M9900: 1
  • M9906 including optional Software Libraries RSA-EC-SCL-PSL”, Infineon (confidential document) [12] M9900 Security Guidelines User’s Manual, 2018-07-03, Infineon [13] SLE97 M9900 Hardware: 1
  • ADV, Cryptographic Standards Compliance Verification, v1, 2018-06-22, TÜV Informationstechnik GmbH (confidential document) 30 / 34 BSI-DSZ-CC-0827-V7-2018 Certification Report C. Excerpts from the Criteria For the: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 2
  • CFB:
    • CFB: 2
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 16
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library 2.01.011: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • B-163: 1
pdf_data/report_keywords/eval_facility/TUV
  • TÜV Informationstechnik: 4
  • TÜViT: 1
  • TÜV Informationstechnik: 5
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik 4 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 1
  • RNG:
    • RNG: 3
  • RNG:
    • RNG: 2
pdf_data/report_keywords/randomness/RNG/RNG 3 2
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • SPA: 1
    • DPA: 1
  • other:
    • JIL: 3
  • SCA:
    • physical probing: 1
    • SPA: 2
    • DPA: 2
  • FI:
    • physical tampering: 1
    • DFA: 2
pdf_data/report_keywords/side_channel_analysis/SCA
  • SPA: 1
  • DPA: 1
  • physical probing: 1
  • SPA: 2
  • DPA: 2
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 1 2
pdf_data/report_keywords/side_channel_analysis/SCA/SPA 1 2
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 37: 1
    • AIS 31: 2
    • AIS 36: 3
    • AIS31: 1
    • AIS 35: 2
    • AIS 32: 1
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 2
  • FIPS:
    • FIPS186-4: 3
    • FIPS197: 8
    • FIPS180-4: 3
    • FIPS PUB 186-4: 1
    • FIPS PUB 180-4: 1
  • PKCS:
    • PKCS #1: 3
  • BSI:
    • AIS 34: 2
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 1
    • AIS 23: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 31: 2
    • AIS 32: 1
    • AIS 35: 2
    • AIS 36: 3
    • AIS 37: 1
    • AIS 38: 1
    • AIS 41: 1
    • AIS 46: 1
    • AIS31: 2
  • RFC:
    • RFC5639: 3
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 37: 1
  • AIS 31: 2
  • AIS 36: 3
  • AIS31: 1
  • AIS 35: 2
  • AIS 32: 1
  • AIS 38: 1
  • AIS 34: 2
  • AIS 1: 1
  • AIS 14: 1
  • AIS 19: 1
  • AIS 20: 1
  • AIS 23: 1
  • AIS 25: 1
  • AIS 26: 1
  • AIS 31: 2
  • AIS 32: 1
  • AIS 35: 2
  • AIS 36: 3
  • AIS 37: 1
  • AIS 38: 1
  • AIS 41: 1
  • AIS 46: 1
  • AIS31: 2
pdf_data/report_keywords/standard_id/BSI/AIS 25 2 1
pdf_data/report_keywords/standard_id/BSI/AIS 26 2 1
pdf_data/report_keywords/standard_id/BSI/AIS31 1 2
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
  • ISO/IEC 14443: 4
  • ISO/IEC 7816: 2
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • DES:
      • DES: 4
    • 3DES:
      • Triple-DES: 5
      • TDES: 3
  • AES_competition:
    • AES:
      • AES: 19
  • DES:
    • DES:
      • DES: 10
    • 3DES:
      • Triple-DES: 2
      • 3DES: 6
      • TDEA: 1
  • constructions:
    • MAC:
      • CMAC: 2
      • CBC-MAC: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 6 19
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 5
  • TDES: 3
  • Triple-DES: 2
  • 3DES: 6
  • TDEA: 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 5 2
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 4 10
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 36
    • NXP Semiconductors: 53
  • Infineon:
    • Infineon Technologies: 8
    • Infineon Technologies AG: 8
    • Infineon: 23
  • GD:
    • G&D: 2
    • Giesecke & Devrient: 1
pdf_data/report_metadata//CreationDate D:20160223160422+01'00' D:20181016125133+02'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, BSI, P60x144/080yVA/yVA(Y/B/X)y/VE, Secure Smart Card Controller, EAL6, NXP" "Common Criteria, Certification, Zertifizierung, SecurityIC, Infineon, 0827-V7, BSI-CC, M990x"
pdf_data/report_metadata//ModDate D:20160224080500+01'00' D:20181019105320+02'00'
pdf_data/report_metadata//Producer LibreOffice 4.2 LibreOffice 5.2
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0978-2016 Certification Report BSI-DSZ-CC-0827-V7-2018
pdf_data/report_metadata/pdf_file_size_bytes 1316475 1018622
pdf_data/report_metadata/pdf_number_of_pages 42 34
pdf_data/st_filename 0978b_pdf.pdf 0827V7b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • RSA:
    • RSA2048: 2
    • RSA4096: 2
    • RSA-2048: 1
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 17
    • ECC:
      • ECC: 78
  • FF:
    • DH:
      • Diffie-Hellman: 7
    • DSA:
      • DSA: 2
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECC:
    • ECC: 1
  • ECDH:
    • ECDH: 8
  • ECDSA:
    • ECDSA: 17
  • ECC:
    • ECC: 78
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 1 78
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0978: 1
pdf_data/st_keywords/cc_claims/O
  • O.RND: 3
  • O.HW_AES: 7
  • O.CUST_RECONFIG: 5
  • O.EEPROM_INTEGRITY: 5
  • O.FM_FW: 9
  • O.MEM_ACCESS: 9
  • O.SFR_ACCESS: 9
  • O.RND: 1
pdf_data/st_keywords/cc_claims/O/O.RND 3 1
pdf_data/st_keywords/cc_claims/T/T.RND 2 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 1
  • BSI-PP-0035: 3
  • BSI-CC-PP-0035-2007: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0035 1 3
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.5: 11
  • ADV_IMP.2: 4
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 1
  • ADV_ARC: 1
  • ADV_FSP: 4
  • ADV_IMP: 1
  • ADV_FSP.4: 3
  • ADV_SPM: 2
  • ADV_ARC.1: 2
  • ADV_FSP.5: 3
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP: 1
  • ADV_FSP.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 1 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP 4 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 3 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 11 3
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_OPE: 1
  • AGD_PRE: 1
  • AGD_OPE.1: 2
  • AGD_PRE.1: 2
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 1 2
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 1 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 5
  • ALC_CMC.5: 4
  • ALC_CMS.5: 5
  • ALC_DEL.1: 1
  • ALC_DVS.2: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_CMS: 4
  • ALC_CMC: 4
  • ALC_CMS.4: 3
  • ALC_CMC.4: 3
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 3
  • ALC_CMS: 1
  • ALC_TAT: 1
  • ALC_CMS.4: 1
  • ALC_TAT.1: 1
  • ALC_DVS.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 3 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS 4 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 3 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 5 3
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 1 9
pdf_data/st_keywords/cc_sar/ASE
  • ASE_TSS.2: 6
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_INT: 2
  • ASE_CCL: 2
  • ASE_SPD: 2
  • ASE_OBJ: 2
  • ASE_ECD: 2
  • ASE_REQ: 2
  • ASE_TSS: 2
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.3: 4
  • ATE_DPT.3: 1
  • ATE_FUN.2: 1
  • ATE_IND.2: 1
  • ATE_COV: 1
  • ATE_COV.2: 1
  • ATE_DPT.3: 4
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_DPT.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 1 4
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 2
  • AVA_VAN: 1
  • AVA_VAN.5: 11
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 2 11
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6: 36
  • EAL4: 3
  • EAL6+: 1
  • EAL4+: 1
  • EAL 6: 2
  • EAL6 augmented: 3
  • EAL4 augmented: 1
  • EAL5: 7
  • EAL5+: 1
  • EAL 5: 4
  • EAL5 augmented: 3
  • EAL 5 augmented: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG.1: 9
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
    • FCS_COP.1: 23
    • FCS_COP.1.1: 2
    • FCS_CKM.1: 5
    • FCS_CKM.4: 3
  • FDP:
    • FDP_ITT.1: 6
    • FDP_IFC.1: 10
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_SDI.2: 7
    • FDP_SDI.1: 1
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ACC.1: 35
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 32
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_FLS.1: 1
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 4
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.1: 25
    • FMT_SMR.1: 7
    • FMT_MSA.1.1: 2
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
  • FPT:
    • FPT_FLS.1: 7
    • FPT_PHP.3: 7
    • FPT_ITT.1: 6
  • FRU:
    • FRU_FLT.2: 7
  • FAU:
    • FAU_SAS.1: 10
    • FAU_SAS: 5
    • FAU_GEN: 1
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG: 29
    • FCS_RNG.1: 25
    • FCS_COP.1: 39
    • FCS_CKM.1: 45
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
    • FCS_COP: 139
    • FCS_CKM.4: 35
    • FCS_CKM: 21
    • FCS_CKM.2: 5
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACF.1: 19
    • FDP_SDI.1: 17
    • FDP_SDI.2: 14
    • FDP_ITT.1: 11
    • FDP_IFC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 29
    • FDP_ITC.2: 29
    • FDP_SDI.1.1: 1
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_PHP.3: 1
  • FIA:
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 2
  • FMT:
    • FMT_MSA.1: 17
    • FMT_MSA.3: 19
    • FMT_SMF.1: 15
    • FMT_LIM: 3
    • FMT_LIM.1: 7
    • FMT_LIM.2: 8
    • FMT_SMR.1: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
  • FPT:
    • FPT_TST: 5
    • FPT_TST.2: 34
    • FPT_TST.1: 12
    • FPT_TST.2.1: 2
    • FPT_FLS.1: 18
    • FPT_PHP.3: 14
    • FPT_ITT.1: 13
    • FPT_FLS: 1
  • FRU:
    • FRU_FLT.2: 8
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS.1: 7
  • FAU_SAS.1.1: 1
  • FAU_SAS.1: 10
  • FAU_SAS: 5
  • FAU_GEN: 1
  • FAU_SAS.1.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 7 10
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG.1: 9
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 2
  • FCS_COP.1: 23
  • FCS_COP.1.1: 2
  • FCS_CKM.1: 5
  • FCS_CKM.4: 3
  • FCS_RNG: 29
  • FCS_RNG.1: 25
  • FCS_COP.1: 39
  • FCS_CKM.1: 45
  • FCS_RNG.1.1: 2
  • FCS_RNG.1.2: 2
  • FCS_COP: 139
  • FCS_CKM.4: 35
  • FCS_CKM: 21
  • FCS_CKM.2: 5
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 5 45
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 3 35
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 23 39
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 9 25
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 3 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ITT.1: 6
  • FDP_IFC.1: 10
  • FDP_ITC.1: 5
  • FDP_ITC.2: 5
  • FDP_SDI.2: 7
  • FDP_SDI.1: 1
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ACC.1: 35
  • FDP_ACC.1.1: 2
  • FDP_ACF.1: 32
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 2
  • FDP_ACF.1.4: 2
  • FDP_FLS.1: 1
  • FDP_ACC.1: 23
  • FDP_ACF.1: 19
  • FDP_SDI.1: 17
  • FDP_SDI.2: 14
  • FDP_ITT.1: 11
  • FDP_IFC.1: 14
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 29
  • FDP_ITC.2: 29
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_PHP.3: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 35 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 32 19
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 10 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 5 29
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 5 29
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 6 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 1 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 7 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 1 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM.1: 3
  • FMT_LIM.2: 4
  • FMT_MSA.3: 20
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MSA.1: 25
  • FMT_SMR.1: 7
  • FMT_MSA.1.1: 2
  • FMT_SMF.1: 19
  • FMT_SMF.1.1: 1
  • FMT_MSA.1: 17
  • FMT_MSA.3: 19
  • FMT_SMF.1: 15
  • FMT_LIM: 3
  • FMT_LIM.1: 7
  • FMT_LIM.2: 8
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 3 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 4 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 25 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 20 19
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 19 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 7 6
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 7
  • FPT_PHP.3: 7
  • FPT_ITT.1: 6
  • FPT_TST: 5
  • FPT_TST.2: 34
  • FPT_TST.1: 12
  • FPT_TST.2.1: 2
  • FPT_FLS.1: 18
  • FPT_PHP.3: 14
  • FPT_ITT.1: 13
  • FPT_FLS: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 7 18
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 6 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 7 14
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 7 8
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 11
  • CBC:
    • CBC: 16
  • CTR:
    • CTR: 7
  • CFB:
    • CFB: 9
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 21
    • SmartMX: 1
pdf_data/st_keywords/crypto_library
  • Generic:
    • Crypto Library 1: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 18
  • KA:
    • Key Agreement: 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-192: 4
    • K-163: 2
    • B-163: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
      • SHA1: 65
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
      • SHA256: 65
      • SHA-2: 4
  • MD:
    • MD5:
      • MD5: 65
pdf_data/st_keywords/randomness/RNG/RND 5 2
pdf_data/st_keywords/randomness/RNG/RNG 14 17
pdf_data/st_keywords/randomness/TRNG/TRNG 1 14
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 13
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 1
    • DPA: 2
    • timing attacks: 2
  • FI:
    • physical tampering: 1
    • Malfunction: 10
    • malfunction: 2
    • fault injection: 3
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 8
    • Side-channel: 1
    • SPA: 8
    • DPA: 7
    • Timing Attack: 1
    • template attacks: 3
  • FI:
    • Malfunction: 12
    • malfunction: 1
    • DFA: 7
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 1
  • Malfunction: 10
  • malfunction: 2
  • fault injection: 3
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 10 12
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 2 1
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 13
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 1
  • DPA: 2
  • timing attacks: 2
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 8
  • Side-channel: 1
  • SPA: 8
  • DPA: 7
  • Timing Attack: 1
  • template attacks: 3
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 2 7
pdf_data/st_keywords/side_channel_analysis/SCA/Leak-Inherent 13 10
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 1 8
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 46-3: 3
    • FIPS PUB 197: 3
    • FIPS PUB 46: 1
  • BSI:
    • AIS31: 1
  • ISO:
    • ISO/IEC 7816: 22
    • ISO/IEC 14443: 16
    • ISO/IEC 18092: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS 180-4: 2
    • FIPS PUB 197: 1
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 5
    • AIS32: 4
  • RFC:
    • RFC3447: 14
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 7816-3: 1
  • SCP:
    • SCP 21: 1
    • SCP 43: 1
    • SCP 26: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
pdf_data/st_keywords/standard_id/BSI
  • AIS31: 1
  • AIS31: 5
  • AIS32: 4
pdf_data/st_keywords/standard_id/BSI/AIS31 1 5
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-004: 2
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 46-3: 3
  • FIPS PUB 197: 3
  • FIPS PUB 46: 1
  • FIPS 180-4: 2
  • FIPS PUB 197: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 3 1
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 7816: 22
  • ISO/IEC 14443: 16
  • ISO/IEC 18092: 2
  • ISO/IEC 7816-3: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 32
  • DES:
    • DES:
      • DES: 16
      • DEA: 2
    • 3DES:
      • Triple-DES: 9
      • TDEA: 3
      • Triple-DEA: 1
  • AES_competition:
    • AES:
      • AES: 51
  • DES:
    • DES:
      • DES: 12
    • 3DES:
      • Triple-DES: 3
      • 3DES: 39
      • TDEA: 1
  • constructions:
    • MAC:
      • CMAC: 11
      • CBC-MAC: 3
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 32 51
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 9
  • TDEA: 3
  • Triple-DEA: 1
  • Triple-DES: 3
  • 3DES: 39
  • TDEA: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA 3 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 9 3
pdf_data/st_keywords/symmetric_crypto/DES/DES
  • DES: 16
  • DEA: 2
  • DES: 12
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 16 12
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 4
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 138
    • NXP Semiconductors: 49
  • Infineon:
    • Infineon Technologies: 12
    • Infineon: 9
    • Infineon Technologies AG: 22
pdf_data/st_metadata
  • pdf_file_size_bytes: 878457
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 87
  • /Alternative descriptive title: Security Target Lite
  • /Author: NXP Semiconductors
  • /CertificationID: BSI-DSZ-CC-0978
  • /Company: NXP Semiconductors GmbH Germany
  • /Copyright date: 2015
  • /CreationDate: D:20151210161030+01'00'
  • /Creator: Acrobat PDFMaker 11 für Word
  • /Descriptive title: Security Target Lite
  • /Division: NXP Semiconductors
  • /Document identifier:
  • /Keywords: CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144yVA, P60D080yVA, P60D144yVE, P60D080yVE
  • /ModDate: D:20151210161132+01'00'
  • /Modification date: 14 October 2015
  • /Producer: Adobe PDF Library 11.0
  • /Product name title: <not applicable>
  • /Revision: Rev. 2.61
  • /Security status: <Security status>
  • /SourceModified: D:20151210150346
  • /Specification status: Evaluation documentation PUBLIC
  • /Subject: P60x144/080yVA/yVA(Y/B/X)/yVE
  • /Template date: 29 January 2010
  • /Template version: 2.9.0
  • /Title: Security Target Lite
  • /docpath: W:\WORKAREA_01\data\id_smx21_lib\id_smx21\DOCUMENTS\project_docu\Evaluation\Procedure_P60D144\ASE
  • /list_of_authors:
  • /philips_smx_cl_docpath: I:\P5_CryptoLib\SmxCl\docs\99_prj_mgmt\Templates\V2.9.0_R1
  • /relBiblioPath: ..\Bibliography.doc
  • /test_sec_row_naming: manufacturer area
  • /text_cert_body_long: Bundesamt fuer Sicherheit in der Informationstechnik
  • /text_cert_body_short: BSI
  • /text_developer_long: NXP Semiconductors, Business Unit Security & Connectivity
  • /text_developer_short: NXP Semiconductors
  • /text_product_cfgC080: P60C080P
  • /text_product_cfgC144: P60C144P
  • /text_product_cfgD080: P60D080y
  • /text_product_cfgD144: P60D144y
  • /text_product_cfgD144_nameplate: 9050C
  • /text_product_letter: A
  • /text_product_long: NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE
  • /text_product_minor: VA/VE
  • /text_product_short: NXP Secure Smart Card Controller P60x144/080y
  • /text_product_short_pa: P60x144/080yVA/VE
  • /text_product_short_pa_b: P60x144/080yVA(B)
  • /text_product_short_pa_y: P60x144/080yVA(Y)
  • /text_product_short_pe: P60x144/080yVE
  • /text_sponsor_long: NXP Semiconductors, Business Unit Security & Connectivity
  • /text_sponsor_short: NXP
  • pdf_hyperlinks: http://www.nxp.com/, mailto:[email protected]
  • pdf_file_size_bytes: 1401146
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 104
  • /Author: Urian Rainer (IFAG CCS SQM PS)
  • /Keywords: Infineon
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20180829133914+02'00'
  • /ModDate: D:20180829133914+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks: http://www.ietf.org/rfc/rfc5639.txt, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.bsi.bund.de/, http://www.infineon.com/
pdf_data/st_metadata//Author NXP Semiconductors Urian Rainer (IFAG CCS SQM PS)
pdf_data/st_metadata//CreationDate D:20151210161030+01'00' D:20180829133914+02'00'
pdf_data/st_metadata//Creator Acrobat PDFMaker 11 für Word Microsoft® Word 2010
pdf_data/st_metadata//Keywords CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144yVA, P60D080yVA, P60D144yVE, P60D080yVE Infineon
pdf_data/st_metadata//ModDate D:20151210161132+01'00' D:20180829133914+02'00'
pdf_data/st_metadata//Producer Adobe PDF Library 11.0 Microsoft® Word 2010
pdf_data/st_metadata/pdf_file_size_bytes 878457 1401146
pdf_data/st_metadata/pdf_hyperlinks http://www.nxp.com/, mailto:[email protected] http://www.ietf.org/rfc/rfc5639.txt, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.bsi.bund.de/, http://www.infineon.com/
pdf_data/st_metadata/pdf_number_of_pages 87 104
dgst 6ce78dc0d982a21f 168584cce12fa52e