Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software
BSI-DSZ-CC-0829-2012
NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6021P VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6021M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
BSI-DSZ-CC-0955-2016
name Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6021P VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6021M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
not_valid_before 2012-09-05 2016-03-17
not_valid_after 2019-09-01 2021-03-17
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0829b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0955b_pdf.pdf
manufacturer Infineon Technologies AG NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.infineon.com/ https://www.nxp.com
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0829a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0955a_pdf.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2013, 6, 24), 'maintenance_title': 'Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0829_ma1a_pdf.pdf', 'maintenance_st_link': None}) frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2016, 6, 13), 'maintenance_title': 'NXP Smart Card Controller P6021y VB with IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0955ma1a_pdf.pdf', 'maintenance_st_link': None})
state/report/pdf_hash c612a4e4a03364a599c924a20703c107b54e32289b1057453bbdfd51958a3c0e 6c0f9c6e656827d0ef5c2d2a350b78cedec5888c38618590f1d88d17e7a947c7
state/report/txt_hash 2223602b87bfe5c7d8bc107cfa67b79061df9eeda58c1f23157114c411d3ce4d 0c4127b332745f5a2181b0b8eac09305e5becbfe3acd4dbf208ee5712fa33dc2
state/st/pdf_hash 5640d1648931967eae59f8fdfec115c14673e5c9ffc9cdca7689932a1efb4a75 53ac2e12b00c7347a74393a97cdf0accf3d46e387a3173c75850b5a7a4f88a54
state/st/txt_hash cdf3132511bdb9afcb540dc038bb07430cd4f185de2045a7dfcf431da3f10637 daadceb22bdb6c6204b7ac311bcbffc6f30e0c9e4eb17667d806bd4bddf1d0a1
heuristics/cert_id BSI-DSZ-CC-0829-2012 BSI-DSZ-CC-0955-2016
heuristics/cpe_matches cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* None
heuristics/direct_transitive_cves CVE-2017-15361 None
heuristics/extracted_versions 1.02.013, 1.01 5, 2, 1
heuristics/indirect_transitive_cves CVE-2017-15361 None
heuristics/related_cves CVE-2017-15361 None
heuristics/report_references/directly_referenced_by ANSSI-CC-2014/11, BSI-DSZ-CC-0904-2015, ANSSI-CC-2013/55, ANSSI-CC-2014/12, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2014/62, ANSSI-CC-2015/25, ANSSI-CC-2013/64, ANSSI-CC-2013/35, ANSSI-CC-2014/48, ANSSI-CC-2014/14, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, ANSSI-CC-2015/09, ANSSI-CC-2013/33, ANSSI-CC-2014/50, ANSSI-CC-2014/49, ANSSI-CC-2013/32, ANSSI-CC-2013/34, CRP290, ANSSI-CC-2013/42, BSI-DSZ-CC-0898-2014, ANSSI-CC-2014/06, ANSSI-CC-2014/13 NSCIB-CC-87206-CR2, NSCIB-CC-15-67351-CR, NSCIB-CC-127667-CR2, BSI-DSZ-CC-0955-V2-2016, CRP296
heuristics/report_references/directly_referencing BSI-DSZ-CC-0728-2011 None
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2015/02, ANSSI-CC-2015/38, ANSSI-CC-2015/40, ANSSI-CC-2015/04, ANSSI-CC-2015/15, ANSSI-CC-2014/11, BSI-DSZ-CC-0836-V2-2017, BSI-DSZ-CC-0904-2015, ANSSI-CC-2013/55, ANSSI-CC-2015/39, ANSSI-CC-2016/75, ANSSI-CC-2014/12, ANSSI-CC-2015/03, BSI-DSZ-CC-0941-2016, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2014/62, ANSSI-CC-2015/25, ANSSI-CC-2013/64, ANSSI-CC-2013/35, ANSSI-CC-2014/48, BSI-DSZ-CC-0952-V2-2016, ANSSI-CC-2015/01, ANSSI-CC-2014/14, ANSSI-CC-2016/74, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2015/41, ANSSI-CC-2014/50, ANSSI-CC-2014/49, ANSSI-CC-2015/08, ANSSI-CC-2013/32, BSI-DSZ-CC-0904-V2-2021, ANSSI-CC-2015/37, ANSSI-CC-2013/34, CRP290, ANSSI-CC-2013/42, BSI-DSZ-CC-0898-2014, ANSSI-CC-2016/03, ANSSI-CC-2014/06, BSI-DSZ-CC-0835-V2-2017, ANSSI-CC-2016/04, ANSSI-CC-2014/86, ANSSI-CC-2014/13, ANSSI-CC-2015/30 ANSSI-CC-2017/72, CRP301, NSCIB-CC-127667-CR2, BSI-DSZ-CC-0955-V2-2016, NSCIB-CC-23-66030-CR, BSI-DSZ-CC-1072-V3-2019, ANSSI-CC-2017/48, ANSSI-CC-2019/47, ANSSI-CC-2019/49, ANSSI-CC-2019/48, ANSSI-CC-2020/36, ANSSI-CC-2020/38, ANSSI-CC-2017/70, ANSSI-CC-2018/06, ANSSI-CC-2017/69, ANSSI-CC-2018/04, NSCIB-CC-87206-CR2, ANSSI-CC-2020/35, ANSSI-CC-2018/05, ANSSI-CC-2017/47, BSI-DSZ-CC-1072-2018, ANSSI-CC-2017/71, NSCIB-CC-15-67351-CR, ANSSI-CC-2018/03, ANSSI-CC-2017/68, BSI-DSZ-CC-1072-V2-2019, ANSSI-CC-2019/50, BSI-DSZ-CC-1072-V5-2022, ANSSI-CC-2020/37, BSI-DSZ-CC-1072-V4-2021, CRP296
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011 None
heuristics/st_references/directly_referenced_by ANSSI-CC-2014/11, BSI-DSZ-CC-0904-2015, ANSSI-CC-2016/75, ANSSI-CC-2014/12, ANSSI-CC-2014/07, ANSSI-CC-2014/62, ANSSI-CC-2013/35, ANSSI-CC-2014/48, ANSSI-CC-2014/14, ANSSI-CC-2016/74, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2013/32, ANSSI-CC-2013/34, BSI-DSZ-CC-0898-2014, ANSSI-CC-2014/06, ANSSI-CC-2014/13 CRP296
heuristics/st_references/directly_referencing BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0813-2012 None
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2014/11, BSI-DSZ-CC-0904-2015, ANSSI-CC-2016/75, ANSSI-CC-2014/12, ANSSI-CC-2014/07, ANSSI-CC-2014/62, ANSSI-CC-2013/35, ANSSI-CC-2014/48, ANSSI-CC-2014/14, ANSSI-CC-2016/74, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2013/32, ANSSI-CC-2013/34, BSI-DSZ-CC-0898-2014, ANSSI-CC-2014/06, ANSSI-CC-2014/13 CRP296
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0728-2011 None
pdf_data/report_filename 0829a_pdf.pdf 0955a_pdf.pdf
pdf_data/report_frontpage/DE
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0829-2012
  • cert_item: Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software
  • developer: Infineon Technologies AG
  • cert_lab: BSI
  • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
  • cert_id: BSI-DSZ-CC-0955-2016
  • cert_item: NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software
  • developer: NXP Semiconductors Germany GmbH
  • cert_lab: BSI
  • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
  • cc_security_level: Common Criteria Part 3 conformant P6021P VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6021M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 SOGIS Recognition Agreement
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0829-2012 BSI-DSZ-CC-0955-2016
pdf_data/report_frontpage/DE/cert_item Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software
pdf_data/report_frontpage/DE/developer Infineon Technologies AG NXP Semiconductors Germany GmbH
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 2
    • RSA4096: 2
    • RSA-2048: 1
    • RSA 1024: 1
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 4
    • ECC:
      • ECC: 4
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0829-2012: 24
  • BSI-DSZ-CC-0728-2011: 3
  • BSI-DSZ-CC-0955-2016: 25
pdf_data/report_keywords/cc_claims/O/O.C 2 7
pdf_data/report_keywords/cc_claims/R/R.O 2 7
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0035-2007: 3
  • BSI-CC-PP-0084-2014: 4
pdf_data/report_keywords/cc_sar/ADV/ADV_IMP.2 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.3 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_SPM.1 1 2
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.5 1 2
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 1 3
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 3 5
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 2 3
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 7 9
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 1 3
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 1 6
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 2 3
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 1 3
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 1 9
pdf_data/report_keywords/cc_sar/ATE/ATE_COV.3 1 2
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT.3 2 3
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN 1 2
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN.2 1 2
pdf_data/report_keywords/cc_sar/ATE/ATE_IND 1 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 2 3
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 6 7
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 6
  • EAL 4: 3
  • EAL1: 7
  • EAL4: 8
  • EAL5+: 1
  • EAL6: 4
  • EAL3: 4
  • EAL5: 6
  • EAL7: 4
  • EAL2: 3
  • EAL 5 augmented: 3
  • EAL6: 5
  • EAL 5: 14
  • EAL 4: 9
  • EAL 1: 7
  • EAL 2: 4
  • EAL5: 4
  • EAL 6: 5
  • EAL 5+: 1
  • EAL 3: 4
  • EAL 7: 4
  • EAL6 augmented: 3
  • EAL 5 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 3 9
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 6 14
pdf_data/report_keywords/cc_security_level/EAL/EAL5 6 4
pdf_data/report_keywords/cc_security_level/EAL/EAL6 4 5
pdf_data/report_keywords/cc_sfr
  • FTP:
    • FTP_TRP.1: 2
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • A11 and M11, Version 3, 2012-08-28, TÜV Informationstechnik GmbH – Evaluation Body for IT Security (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product M7820 A11 and M11, Version 3: 1
  • TÜV Informationstechnik GmbH, Evaluation Body for IT Security (confidential document) [10] Configuration Management Scope M7820 A11 and M11 including optional Software Libraries RSA –: 1
  • – SHA-2 – Toolbox, Version 1.1, 2012-06-29, Infineon Technologies AG (confidential document) [11] M7801/M7820 Controller Security Guidelines, 2012-05-07, Infineon Technologies AG [12] SLx 70: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • 0.93, 2016-01-25, NXP Secure Smart Card Controller P6021y VB Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 3, 2016-02-12, EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
  • TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration lists for the TOE: NXP Secure Smart Card Controller P602xy VB Firmware: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 3
  • CBC:
    • CBC: 14
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 5
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 33
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/eval_facility/TUV
  • TÜV Informationstechnik: 4
  • TÜV Informationstechnik: 4
  • TÜViT: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 24
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 1
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
  • RNG:
    • RNG: 2
pdf_data/report_keywords/randomness/RNG/RNG 1 2
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
    • SPA: 5
    • DPA: 6
  • FI:
    • physical tampering: 1
    • DFA: 5
  • other:
    • JIL: 4
  • SCA:
    • physical probing: 1
    • SPA: 1
    • DPA: 1
  • other:
    • JIL: 3
pdf_data/report_keywords/side_channel_analysis/SCA/DPA 6 1
pdf_data/report_keywords/side_channel_analysis/SCA/SPA 5 1
pdf_data/report_keywords/side_channel_analysis/other/JIL 4 3
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 26: 2
  • AIS 31: 2
  • AIS 36: 3
  • AIS31: 1
  • AIS 32: 1
  • AIS 35: 1
  • AIS 38: 1
  • AIS47: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 37: 2
  • AIS 31: 2
  • AIS 36: 2
  • AIS 35: 2
  • AIS 26: 1
  • AIS 32: 1
pdf_data/report_keywords/standard_id/BSI/AIS 26 2 1
pdf_data/report_keywords/standard_id/BSI/AIS 35 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 36 3 2
pdf_data/report_keywords/standard_id/ISO
  • ISO/IEC 18092: 6
  • ISO/IEC 15408: 4
  • ISO/IEC 18045: 4
  • ISO/IEC 17065: 2
  • ISO/IEC 14443: 6
  • ISO/IEC 7816: 2
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 5 17
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • Triple-DES: 3
  • 3DES: 3
  • TDES: 3
  • Triple-DES: 4
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 3 4
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 3 8
pdf_data/report_keywords/symmetric_crypto/constructions/MAC
  • HMAC: 1
  • CMAC: 5
pdf_data/report_keywords/technical_report_id/BSI
  • BSI TR-02102: 1
  • BSI 7125: 2
  • BSI 7148: 1
  • BSI TR-02102: 1
  • BSI 7148: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 14
    • Infineon Technologies AG: 18
    • Infineon Technologies: 8
  • GD:
    • G&D: 1
  • NXP:
    • NXP: 24
    • NXP Semiconductors: 32
pdf_data/report_metadata//CreationDate D:20120912093345+02'00' D:20160405095923+02'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software, Infineon Technologies AG" "Common Criteria, Certification, Zertifizierung, Smart Card"
pdf_data/report_metadata//ModDate D:20120912093725+02'00' D:20160411090741+02'00'
pdf_data/report_metadata//Producer LibreOffice 3.5 LibreOffice 4.2
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0829-2012 Certification Report BSI-DSZ-CC-0955-2016
pdf_data/report_metadata/pdf_file_size_bytes 1362115 1367443
pdf_data/report_metadata/pdf_number_of_pages 46 42
pdf_data/st_filename 0829b_pdf.pdf 0955b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA2048: 1
    • RSA4096: 1
    • RSA-2048: 1
  • ECC:
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 12
    • ECC:
      • ECC: 16
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 4
  • ECDSA:
    • ECDSA: 12
  • ECC:
    • ECC: 16
  • ECC:
    • ECC: 3
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 16 3
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0813-2012: 1
    • BSI-DSZ-CC-0695-2011: 1
  • NL:
    • CC-0728-2011: 1
  • DE:
    • BSI-DSZ-CC-0955: 1
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0813-2012: 1
  • BSI-DSZ-CC-0695-2011: 1
  • BSI-DSZ-CC-0955: 1
pdf_data/st_keywords/cc_claims/O
  • O.RND: 1
  • O.RND: 3
  • O.TDES: 6
  • O.AES: 6
  • O.CUST_RECONF_PLAIN: 6
  • O.EEPROM_INTEGRITY: 5
  • O.FM_FW: 9
  • O.MEM_ACCESS: 10
  • O.SFR_ACCESS: 9
  • O.PUF: 6
  • O.CUST_RECONF_MIFARE: 6
  • O.ACCESS-CONTROL: 8
  • O.AUTHENTICATION: 7
  • O.ENCRYPTION: 6
  • O.MAC: 6
  • O.TYPE-CONSISTENCY: 4
  • O.DF-TRANSACTION: 4
  • O.TYPE-: 2
  • O.ACCESS-: 1
  • O.DF-: 2
pdf_data/st_keywords/cc_claims/O/O.RND 1 3
pdf_data/st_keywords/cc_claims/T/T.RND 1 2
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0035: 2
  • BSI-PP-0084-2014: 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 2
  • ADV_FSP.5: 3
  • ADV_IMP.1: 2
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_FSP: 1
  • ADV_FSP.4: 1
  • ADV_FSP.2: 1
  • ADV_TDS.3: 1
  • ADV_ARC.1: 2
  • ADV_FSP.5: 22
  • ADV_IMP.2: 4
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 1
  • ADV_ARC: 2
  • ADV_FSP: 8
  • ADV_IMP: 2
  • ADV_FSP.4: 6
  • ADV_SPM: 2
  • ADV_IMP.1: 1
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP 1 8
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 1 6
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 3 22
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.1 2 1
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 2
  • AGD_PRE.1: 2
  • AGD_OPE.1: 2
  • AGD_PRE.1: 2
  • AGD_OPE: 2
  • AGD_PRE: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS: 1
  • ALC_DVS.2: 9
  • ALC_CMC.4: 1
  • ALC_CMS.5: 3
  • ALC_DEL.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.2: 1
  • ALC_CMS: 1
  • ALC_CMS.4: 1
  • ALC_DVS.1: 1
  • ALC_FLR.1: 6
  • ALC_DVS.2: 5
  • ALC_CMC.5: 4
  • ALC_CMS.5: 10
  • ALC_DEL.1: 2
  • ALC_LCD.1: 2
  • ALC_TAT.3: 1
  • ALC_DEL: 2
  • ALC_DVS: 2
  • ALC_CMS: 8
  • ALC_CMC: 5
  • ALC_CMS.4: 6
  • ALC_CMC.4: 4
  • ALC_TAT.2: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 1 4
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS 1 8
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 1 6
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 3 10
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 1 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS 1 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 9 5
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 1 2
pdf_data/st_keywords/cc_sar/ASE
  • ASE_INT: 2
  • ASE_CCL: 2
  • ASE_SPD: 2
  • ASE_OBJ: 2
  • ASE_ECD: 2
  • ASE_REQ: 2
  • ASE_TSS: 2
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
  • ASE_TSS.1: 1
  • ASE_TSS.2: 10
  • ASE_CCL.1: 2
  • ASE_ECD.1: 2
  • ASE_INT.1: 2
  • ASE_OBJ.2: 2
  • ASE_REQ.2: 2
  • ASE_SPD.1: 2
  • ASE_TSS: 2
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 1 2
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 1 2
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 1 2
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 1 2
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 1 2
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 1 2
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 1
  • ATE_DPT.3: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.3: 4
  • ATE_DPT.3: 2
  • ATE_FUN.2: 1
  • ATE_IND.2: 2
  • ATE_COV: 2
  • ATE_COV.2: 1
  • ATE_FUN.1: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 2
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 11
  • AVA_VAN.5: 7
  • AVA_VAN: 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 11 7
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 5
  • EAL 5: 3
  • EAL5 augmented: 1
  • EAL 5 augmented: 3
  • EAL6: 43
  • EAL5: 39
  • EAL6+: 13
  • EAL5+: 18
  • EAL4: 1
  • EAL4+: 3
  • EAL6 augmented: 4
  • EAL5 augmented: 2
  • EAL4 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 5 39
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 10
    • FAU_SAS: 4
    • FAU_GEN: 1
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG: 13
    • FCS_RNG.1: 29
    • FCS_COP.1: 28
    • FCS_CKM.1: 34
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_COP: 58
    • FCS_CKM.4: 24
    • FCS_CKM: 24
    • FCS_CKM.2: 5
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACF.1: 22
    • FDP_SDI.1: 17
    • FDP_SDI.2: 15
    • FDP_ITT.1: 18
    • FDP_IFC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 18
    • FDP_ITC.2: 18
    • FDP_SDI.1.1: 1
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 2
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.3: 21
    • FMT_SMF.1: 16
    • FMT_LIM: 3
    • FMT_LIM.1: 7
    • FMT_LIM.2: 7
    • FMT_SMR.1: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MSA.2: 1
    • FMT_CKM.4: 1
  • FPT:
    • FPT_TST: 7
    • FPT_TST.2: 36
    • FPT_TST.1: 11
    • FPT_FLS.1: 19
    • FPT_PHP.3: 25
    • FPT_ITT.1: 16
    • FPT_TST.2.1: 1
    • FPT_AMT.1: 1
    • FPT_LIM.2: 1
  • FRU:
    • FRU_FLT.2: 7
  • FAU:
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG.1: 8
    • FCS_COP.1: 84
    • FCS_CKM.4: 65
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
    • FCS_CKM.1: 34
    • FCS_COP.1.1: 7
    • FCS_CKM.4.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
  • FDP:
    • FDP_SDC.1: 16
    • FDP_SDI.2: 30
    • FDP_ITT.1: 6
    • FDP_IFC.1: 20
    • FDP_SDI.1: 4
    • FDP_SDI.2.1: 4
    • FDP_SDI.2.2: 4
    • FDP_SDC.1.1: 2
    • FDP_ITC.1: 24
    • FDP_ITC.2: 44
    • FDP_ACC.1: 76
    • FDP_ACC.1.1: 4
    • FDP_ACF.1: 58
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_ITC.2.1: 2
    • FDP_ITC.2.2: 2
    • FDP_ITC.2.3: 2
    • FDP_ITC.2.4: 2
    • FDP_ITC.2.5: 2
    • FDP_ROL.1: 7
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
  • FIA:
    • FIA_UID.1: 10
    • FIA_UID.2: 17
    • FIA_UAU.2: 15
    • FIA_UAU.1: 2
    • FIA_UAU.5: 13
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 4
    • FMT_MSA.3: 48
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MSA.1: 53
    • FMT_SMR.1: 33
    • FMT_MSA.1.1: 4
    • FMT_SMF.1: 45
    • FMT_SMF.1.1: 3
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_FLS.1: 8
    • FPT_PHP.3: 8
    • FPT_ITT.1: 6
    • FPT_TDC.1: 19
    • FPT_TDC.1.1: 2
    • FPT_TDC.1.2: 2
    • FPT_RPL.1: 16
    • FPT_RPL.1.1: 2
    • FPT_RPL.1.2: 2
  • FRU:
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP.1: 26
    • FTP_TRP.1.1: 2
    • FTP_TRP.1.2: 2
    • FTP_TRP.1.3: 7
    • FTP_ROL.1: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS.1: 10
  • FAU_SAS: 4
  • FAU_GEN: 1
  • FAU_SAS.1.1: 1
  • FAU_SAS.1: 7
  • FAU_SAS.1.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS.1 10 7
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 13
  • FCS_RNG.1: 29
  • FCS_COP.1: 28
  • FCS_CKM.1: 34
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_COP: 58
  • FCS_CKM.4: 24
  • FCS_CKM: 24
  • FCS_CKM.2: 5
  • FCS_RNG.1: 8
  • FCS_COP.1: 84
  • FCS_CKM.4: 65
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 2
  • FCS_CKM.1: 34
  • FCS_COP.1.1: 7
  • FCS_CKM.4.1: 5
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 5 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 24 65
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 28 84
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 29 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 1 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 1 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 25
  • FDP_ACF.1: 22
  • FDP_SDI.1: 17
  • FDP_SDI.2: 15
  • FDP_ITT.1: 18
  • FDP_IFC.1: 15
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 18
  • FDP_ITC.2: 18
  • FDP_SDI.1.1: 1
  • FDP_SDI.2.1: 2
  • FDP_SDI.2.2: 2
  • FDP_SDC.1: 16
  • FDP_SDI.2: 30
  • FDP_ITT.1: 6
  • FDP_IFC.1: 20
  • FDP_SDI.1: 4
  • FDP_SDI.2.1: 4
  • FDP_SDI.2.2: 4
  • FDP_SDC.1.1: 2
  • FDP_ITC.1: 24
  • FDP_ITC.2: 44
  • FDP_ACC.1: 76
  • FDP_ACC.1.1: 4
  • FDP_ACF.1: 58
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_ITC.2.1: 2
  • FDP_ITC.2.2: 2
  • FDP_ITC.2.3: 2
  • FDP_ITC.2.4: 2
  • FDP_ITC.2.5: 2
  • FDP_ROL.1: 7
  • FDP_ROL.1.1: 1
  • FDP_ROL.1.2: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 25 76
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 1 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 22 58
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 1 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 1 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 1 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 1 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 15 20
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 18 24
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 18 44
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 18 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.1 17 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 15 30
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.1 2 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2.2 2 4
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_SOS.2: 3
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 2
  • FIA_UID.1: 10
  • FIA_UID.2: 17
  • FIA_UAU.2: 15
  • FIA_UAU.1: 2
  • FIA_UAU.5: 13
  • FIA_UAU.5.1: 2
  • FIA_UAU.5.2: 2
  • FIA_UID.2.1: 1
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 20
  • FMT_MSA.3: 21
  • FMT_SMF.1: 16
  • FMT_LIM: 3
  • FMT_LIM.1: 7
  • FMT_LIM.2: 7
  • FMT_SMR.1: 6
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MSA.2: 1
  • FMT_CKM.4: 1
  • FMT_LIM.1: 3
  • FMT_LIM.2: 4
  • FMT_MSA.3: 48
  • FMT_MSA.3.1: 4
  • FMT_MSA.3.2: 4
  • FMT_MSA.1: 53
  • FMT_SMR.1: 33
  • FMT_MSA.1.1: 4
  • FMT_SMF.1: 45
  • FMT_SMF.1.1: 3
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.1 7 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 7 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 53
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 1 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 21 48
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 1 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 1 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 16 45
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 1 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 6 33
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST: 7
  • FPT_TST.2: 36
  • FPT_TST.1: 11
  • FPT_FLS.1: 19
  • FPT_PHP.3: 25
  • FPT_ITT.1: 16
  • FPT_TST.2.1: 1
  • FPT_AMT.1: 1
  • FPT_LIM.2: 1
  • FPT_FLS.1: 8
  • FPT_PHP.3: 8
  • FPT_ITT.1: 6
  • FPT_TDC.1: 19
  • FPT_TDC.1.1: 2
  • FPT_TDC.1.2: 2
  • FPT_RPL.1: 16
  • FPT_RPL.1.1: 2
  • FPT_RPL.1.2: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 19 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 16 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 25 8
pdf_data/st_keywords/cc_sfr/FRU/FRU_FLT.2 7 8
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 4
  • CBC:
    • CBC: 4
  • CFB:
    • CFB: 5
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 7
pdf_data/st_keywords/cipher_mode/CBC/CBC 4 7
pdf_data/st_keywords/cipher_mode/ECB/ECB 4 2
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 13
    • SmartMX: 1
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 12
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 23
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-512: 2
      • SHA-2: 61
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 14
  • PRNG:
    • PRNG: 7
  • RNG:
    • RND: 2
    • RNG: 9
  • TRNG:
    • TRNG: 1
  • RNG:
    • RND: 5
    • RNG: 16
pdf_data/st_keywords/randomness/RNG/RND 2 5
pdf_data/st_keywords/randomness/RNG/RNG 9 16
pdf_data/st_keywords/randomness/TRNG/TRNG 14 1
pdf_data/st_keywords/side_channel_analysis/FI
  • Malfunction: 12
  • malfunction: 1
  • DFA: 7
  • fault induction: 1
  • physical tampering: 1
  • Malfunction: 10
  • malfunction: 2
  • fault injection: 2
pdf_data/st_keywords/side_channel_analysis/FI/Malfunction 12 10
pdf_data/st_keywords/side_channel_analysis/FI/malfunction 1 2
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 8
  • SPA: 5
  • DPA: 10
  • Leak-Inherent: 10
  • Physical Probing: 2
  • physical probing: 1
  • side channel: 1
  • DPA: 2
  • timing attacks: 2
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 10 2
pdf_data/st_keywords/side_channel_analysis/SCA/side channel 8 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 180-4: 2
  • PKCS:
    • PKCS#1: 1
  • BSI:
    • AIS31: 10
    • AIS32: 5
  • RFC:
    • RFC3447: 11
    • RFC 5639: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC18092: 6
    • ISO/IEC 18092: 6
    • ISO/IEC 7816-3: 1
  • CC:
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
  • FIPS:
    • FIPS 197: 5
    • FIPS PUB 197: 4
  • NIST:
    • NIST SP 800-67: 6
    • NIST SP 800-38A: 6
    • NIST SP 800-38B: 2
  • BSI:
    • AIS20: 2
    • AIS31: 4
  • ISO:
    • ISO/IEC 7816: 28
    • ISO/IEC 14443: 24
    • ISO/IEC 9797-1: 1
    • ISO/IEC 18092: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/st_keywords/standard_id/BSI
  • AIS31: 10
  • AIS32: 5
  • AIS20: 2
  • AIS31: 4
pdf_data/st_keywords/standard_id/BSI/AIS31 10 4
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-001: 1
  • CCMB-2009-07-002: 1
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 197: 2
  • FIPS PUB 180-4: 2
  • FIPS 197: 5
  • FIPS PUB 197: 4
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 2 4
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 14443: 2
  • ISO/IEC18092: 6
  • ISO/IEC 18092: 6
  • ISO/IEC 7816-3: 1
  • ISO/IEC 7816: 28
  • ISO/IEC 14443: 24
  • ISO/IEC 9797-1: 1
  • ISO/IEC 18092: 2
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 14443 2 24
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 18092 6 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 24 118
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • 3DES: 17
  • Triple-DES: 3
  • Triple-DES: 30
  • TDES: 51
  • TDEA: 1
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 3 30
pdf_data/st_keywords/symmetric_crypto/DES/DES
  • DES: 8
  • DES: 6
  • DEA: 1
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 8 6
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • HMAC: 4
  • CBC-MAC: 2
  • CMAC: 9
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 1: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 16
    • Infineon: 9
    • Infineon Technologies: 7
  • NXP:
    • NXP: 175
    • NXP Semiconductors: 42
    • NXP Semiconductors N.V: 128
pdf_data/st_metadata
  • pdf_file_size_bytes: 889908
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 85
  • /Title: CC EAL5+ Certification Security Target
  • /Author: Hans-Ulrich Buchmüller
  • /Subject: Security Target M7892 Integrity Guard
  • /Keywords: Dresden, Burlington, contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, cryptographic, libraries, CCv3.1
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20120828132014
  • /ModDate: D:20120828132014
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_file_size_bytes: 727825
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 128
  • /Author: NXP Semiconductors
  • /CreationDate: D:20160125124140+01'00'
  • /Creator: DITA Open Toolkit
  • /Keywords: CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6021y VB, P6021P VB, P6021M VB, P6021D VB, P6021J VB
  • /ModDate: D:20160125124752+01'00'
  • /PDFVersion: 1.4
  • /Producer: Apache FOP Version 1.1
  • /Subject: NXP Secure Smart Card Controller P6021y VB
  • /Title: Security Target Lite
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Hans-Ulrich Buchmüller NXP Semiconductors
pdf_data/st_metadata//CreationDate D:20120828132014 D:20160125124140+01'00'
pdf_data/st_metadata//Creator Microsoft® Office Word 2007 DITA Open Toolkit
pdf_data/st_metadata//Keywords Dresden, Burlington, contactless, dual interface, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, cryptographic, libraries, CCv3.1 CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6021y VB, P6021P VB, P6021M VB, P6021D VB, P6021J VB
pdf_data/st_metadata//ModDate D:20120828132014 D:20160125124752+01'00'
pdf_data/st_metadata//Producer Microsoft® Office Word 2007 Apache FOP Version 1.1
pdf_data/st_metadata//Subject Security Target M7892 Integrity Guard NXP Secure Smart Card Controller P6021y VB
pdf_data/st_metadata//Title CC EAL5+ Certification Security Target Security Target Lite
pdf_data/st_metadata/pdf_file_size_bytes 889908 727825
pdf_data/st_metadata/pdf_hyperlinks http://www.bsi.bund.de/
pdf_data/st_metadata/pdf_is_encrypted False True
pdf_data/st_metadata/pdf_number_of_pages 85 128
dgst 6de5e7a68582ea80 d445d0f22662a484