Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
BSI-DSZ-CC-0827-2013
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A, P5CC012V0A all with IC dedicated software: Secured Crypto Library Release 2.0
BSI-DSZ-CC-0549-2008
name Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A, P5CC012V0A all with IC dedicated software: Secured Crypto Library Release 2.0
not_valid_after 09.09.2014 01.09.2019
not_valid_before 22.02.2013 26.11.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0549a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0549b.pdf
manufacturer Infineon Technologies AG NXP Semiconductors
manufacturer_web https://www.infineon.com/ https://www.nxp.com/
security_level AVA_VAN.5, ALC_DVS.2, EAL5+ AVA_VLA.4, AVA_MSU.3, EAL5+, ALC_DVS.2
dgst cac36ad3c18fbc02 f636c56027207065
heuristics/cert_id BSI-DSZ-CC-0827-2013 BSI-DSZ-CC-0549-2008
heuristics/extracted_sars ALC_CMS.5, APE_REQ.2, ASE_INT.1, APE_INT.1, ATE_FUN.1, ADV_IMP.1, ADV_SPM.1, ATE_DPT.3, ASE_TSS.1, APE_SPD.1, APE_ECD.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ATE_IND.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_FLR.3, ALC_DEL.1, APE_OBJ.2, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, APE_CCL.1, ASE_ECD.1 ADV_LLD.1, ATE_FUN.1, ADV_HLD.3, AVA_VLA.4, AVA_SOF.1, AGD_ADM.1, ADV_IMP.2, AGD_USR.1, ALC_DVS.2, ATE_DPT.2, AVA_CCA.1, ATE_COV.2, ADV_INT.1, ALC_TAT.2, ALC_LCD.2, AVA_MSU.3, ADV_RCR.2, ADV_SPM.3, ATE_IND.2, ADV_FSP.3
heuristics/extracted_versions 1.01.0008, 1.03.006 2.0
heuristics/next_certificates BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-V4-2016, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V8-2020 {}
heuristics/report_references/directly_referenced_by BSI-DSZ-CC-0827-V2-2014 {}
heuristics/report_references/directly_referencing BSI-DSZ-CC-0791-2012 BSI-DSZ-CC-0464-2008
heuristics/report_references/indirectly_referenced_by BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0946-V3-2017, BSI-DSZ-CC-0827-V4-2016, ANSSI-CC-2016/60, BSI-DSZ-CC-0827-V7-2018, ANSSI-CC-2019/38, CSEC2014007, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0946-V2-2015, BSI-DSZ-CC-0827-V2-2014 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0791-2012 BSI-DSZ-CC-0464-2008
maintenance_updates
protection_profiles
pdf_data/report_filename 0827a_pdf.pdf 0549a.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0827-2013
    • cert_item: Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
    • cert_lab: BSI
    • developer: Infineon Technologies AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
    • cert_id: BSI-DSZ-CC-0549-2008
    • cert_item: NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A, P5CC012V0A all with IC dedicated software: Secured Crypto Library Release 2.0
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0791-2012: 3
    • BSI-DSZ-CC-0827-2013: 23
    • BSI-DSZ-CC-S-0007-2011: 1
    • BSI-DSZ-CC-S-0015-2012: 1
  • DE:
    • BSI-DSZ-CC-0464-2008: 2
    • BSI-DSZ-CC-0549-2008: 19
  • NL:
    • CC-464-2008: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035-2007: 4
  • BSI:
    • BSI-PP-0002-2001: 7
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 5: 8
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.3: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.3: 1
    • ADV_HLD: 2
    • ADV_HLD.3: 1
    • ADV_IMP: 2
    • ADV_IMP.2: 1
    • ADV_INT: 2
    • ADV_INT.1: 1
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_RCR.2: 1
    • ADV_SPM: 2
    • ADV_SPM.3: 1
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.2: 2
    • ALC_TAT: 2
    • ALC_TAT.2: 2
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_DPT.2: 1
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_CCA.1: 1
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
  • O:
    • O.C: 1
  • R:
    • R.O: 1
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 1
  • Infineon:
    • Infineon: 5
    • Infineon Technologies: 17
    • Infineon Technologies AG: 22
  • Infineon:
    • Infineon Technologies AG: 1
  • NXP:
    • NXP: 14
    • NXP Semiconductors: 27
  • Philips:
    • Philips: 1
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
  • BrightSight:
    • Brightsight: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 3
      • Triple-DES: 3
    • DES:
      • DES: 4
  • DES:
    • 3DES:
      • 3DES: 1
      • Triple-DES: 2
    • DES:
      • DES: 6
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 1024: 1
    • RSA-2048: 1
    • RSA2048: 2
    • RSA4096: 2
  • ECC:
    • ECC:
      • ECC: 13
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 5
      • SHA-256: 5
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 4
  • RNG:
    • RNG: 3
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 11
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library 2.0: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 6
    • physical tampering: 1
  • SCA:
    • DPA: 6
    • SPA: 5
    • physical probing: 1
  • other:
    • JIL: 4
  • FI:
    • fault injection: 1
  • SCA:
    • Side channel: 1
    • physical probing: 1
    • side channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SSC: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 38: 1
    • AIS31: 2
    • AIS32: 1
    • AIS47: 2
  • BSI:
    • AIS 20: 2
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 3
    • AIS 38: 1
  • FIPS:
    • FIPS 180-1: 2
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Informationstechnik GmbH (confidential document) [11] Configuration Management Scope M9900 A21 including optional Software Libraries RSA - EC –: 1
    • Software Libraries RSA - EC – Toolbox – FTL, Version 1.3, 2013-01-22, Infineon Technologies AG (confidential document) [7] Security Target Lite M9900 A21 including optional Software Libraries RSA - EC – Toolbox – FTL: 1
    • for the M9900 A21 with Crypto Libraries, Version 3, 2013-02-08, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the M9900 A21, Version 3, 2013-02-08: 1
    • – FTL, Version 0.4, 2013-01-18, Document Title (confidential document) [12] SLE97 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.03.006),2012-08-16: 1
  • ConfidentialDocument:
    • 1.0, 8 July 2008, Secured Crypto Library on the P5CC024V0A, NXP Semiconductors Germany GmbH (confidential document) [7] Evaluation Technical Report, v2.0, 25 September 2008, Secured Crypto Library on the P5CC024V0A: 1
    • brightsight BV (confidential document) [8] Configuration list for the TOE, 1.0, 08 July 2008, List of Configuration Items 2nd Wave: 1
    • the Product NXP P5CC024V0A Secure Smart Card Controller, 1.1, 16 April 2008, T-Systems GEI GmbH (confidential document) 9 specifically • AIS 25, Version 3, 6 August 2007, Anwendung der CC auf Integrierte Schaltungen: 1
    • to AIS 36 for the Secured Crypto Library on the P5CC037V0A, 2.0, 14 October 2008, brightsight BV (confidential document) 23 / 36 Certification Report BSI-DSZ-CC-0549-2008 This page is intentionally left blank. 24 / 36: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20130311160734+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software, Infineon Technologies AG"
  • /ModDate: D:20130311161303+01'00'
  • /Producer: LibreOffice 3.6
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0827-2013
  • pdf_file_size_bytes: 1235472
  • pdf_hyperlinks: https://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierung, http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20081217124109+01'00'
  • /Creator: Writer
  • /Keywords: "NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A, P5CC012V0Aall with IC dedicated software: Secured Crypto Library Release 2.0, NXP Semiconductors Germany GmbH,"
  • /ModDate: D:20081217162929+01'00'
  • /Producer: StarOffice 8
  • /Subject: Common Criteria
  • /Title: Certification Report BSI-DSZ-CC-0549-2008
  • pdf_file_size_bytes: 409706
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename 0827b_pdf.pdf 0549b.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0464: 1
    • BSI-DSZ-CC-0549: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 2
  • BSI:
    • BSI-PP- 0002-2001: 9
    • BSI-PP-0002-2001: 8
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL5: 6
    • EAL5 augmented: 2
  • EAL:
    • EAL 5: 3
    • EAL 5 augmented: 3
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 3
    • EAL5: 30
    • EAL5 augmented: 3
    • EAL5+: 10
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
    • ALC_LCD.1: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 4
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 11
  • ACM:
    • ACM_AUT: 1
    • ACM_AUT.1: 2
    • ACM_CAP: 1
    • ACM_CAP.4: 1
    • ACM_SCP: 1
    • ACM_SCP.3: 3
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.2: 2
    • ADO_IGS: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.3: 3
    • ADV_HLD.3: 2
    • ADV_IMP.2: 4
    • ADV_INT.1: 2
    • ADV_LLD.1: 2
    • ADV_RCR.2: 2
    • ADV_SPM.1: 1
    • ADV_SPM.3: 2
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 2
    • AGD_USR: 1
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 6
    • ALC_LCD: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.2: 2
  • ASE:
    • ASE_REQ: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA.1: 2
    • AVA_MSU.3: 5
    • AVA_SOF.1: 5
    • AVA_VLA.4: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 23
    • FCS_CKM.1: 31
    • FCS_CKM.2: 5
    • FCS_CKM.4: 23
    • FCS_COP: 47
    • FCS_COP.1: 27
    • FCS_RNG: 12
    • FCS_RNG.1: 30
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 23
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 20
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 10
    • FDP_ITC.1: 17
    • FDP_ITC.2: 17
    • FDP_ITT.1: 13
    • FDP_PHP.3: 1
    • FDP_SDI.1: 17
    • FDP_SDI.1.1: 1
    • FDP_SDI.2: 15
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_SOS.2: 3
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 2
  • FMT:
    • FMT_LIM: 3
    • FMT_LIM.1: 7
    • FMT_LIM.2: 7
    • FMT_MSA.1: 18
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 19
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS: 1
    • FPT_FLS.1: 16
    • FPT_ITT.1: 13
    • FPT_LIM.2: 1
    • FPT_PHP.3: 14
    • FPT_TST: 7
    • FPT_TST.1: 11
    • FPT_TST.2: 36
    • FPT_TST.2.1: 1
  • FRU:
    • FRU_FLT.2: 8
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 44
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 13
    • FCS_CKM.4: 18
    • FCS_COP: 1
    • FCS_COP.1: 80
    • FCS_COP.1.1: 7
    • FCS_RND: 6
    • FCS_RND.1: 15
    • FCS_RND.1.1: 1
    • FCS_RND.2: 32
    • FCS_RND.2.1: 2
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACF.1: 11
    • FDP_IFC.1: 33
    • FDP_ITC.1: 17
    • FDP_ITT: 1
    • FDP_ITT.1: 35
    • FDP_ITT.1.1: 1
    • FDP_RIP: 2
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
  • FMT:
    • FMT_LIM.1: 2
    • FMT_LIM.2: 2
    • FMT_MOF.1: 1
    • FMT_MSA.1: 16
    • FMT_MSA.2: 19
    • FMT_MSA.3: 14
    • FMT_SMF.1: 5
    • FMT_SMR.1: 8
  • FPT:
    • FPT_AMT: 1
    • FPT_AMT.1: 4
    • FPT_FLS.1: 23
    • FPT_FLS.1.1: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 42
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 6
    • FPT_RND.1: 1
    • FPT_RND.2: 1
    • FPT_RVM: 1
    • FPT_SEP.1: 8
    • FPT_TST: 13
    • FPT_TST.1: 13
    • FPT_TST.2: 36
    • FPT_TST.2.1: 2
  • FRU:
    • FRU_FLT.2: 14
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 1
  • T:
    • T.RND: 1
  • O:
    • O.CONFIG: 2
    • O.COPY: 6
    • O.ECC: 7
    • O.ECC_DHKA: 2
    • O.ECC_DHKE: 3
    • O.MEM_ACCESS: 5
    • O.MF_FW: 4
    • O.REUSE: 6
    • O.RND: 14
    • O.RSA: 6
    • O.SFR_ACCESS: 4
    • O.SHA: 7
  • T:
    • T.RND: 6
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 4
    • Infineon Technologies: 2
    • Infineon Technologies AG: 19
  • Infineon:
    • Infineon Technologies: 1
  • NXP:
    • NXP: 92
    • NXP Semiconductors: 25
  • Philips:
    • Philips: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 25
  • DES:
    • 3DES:
      • 3DES: 17
      • Triple-DES: 3
    • DES:
      • DES: 7
  • DES:
    • 3DES:
      • 3DES: 17
      • TDES: 1
      • Triple-DES: 19
    • DES:
      • DEA: 1
      • DES: 43
  • constructions:
    • MAC:
      • CBC-MAC: 12
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 17
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • Diffie-Hellman: 5
    • DSA:
      • DSA: 1
  • RSA:
    • RSA-2048: 1
    • RSA2048: 2
    • RSA4096: 2
  • ECC:
    • ECC:
      • ECC: 66
  • FF:
    • DH:
      • Diffie-Hellman: 11
  • RSA:
    • RSA-CRT: 3
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 47
  • SHA:
    • SHA1:
      • SHA1: 47
    • SHA2:
      • SHA256: 47
  • SHA:
    • SHA1:
      • SHA-1: 14
    • SHA2:
      • SHA-224: 10
      • SHA-256: 12
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • KEX:
    • Key Exchange: 10
  • MAC:
    • MAC: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 10
  • TRNG:
    • TRNG: 14
  • RNG:
    • RND: 21
    • RNG: 102
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 4
  • CBC:
    • CBC: 17
  • ECB:
    • ECB: 11
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 122
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 7
    • Malfunction: 12
    • malfunction: 1
  • SCA:
    • DPA: 7
    • Leak-Inherent: 10
    • Physical Probing: 2
    • SPA: 6
    • Side-channel: 1
    • Timing Attack: 1
    • physical probing: 1
    • side channel: 6
  • other:
    • reverse engineering: 1
  • FI:
    • DFA: 36
    • Malfunction: 12
    • fault induction: 1
    • fault injection: 1
    • malfunction: 2
  • SCA:
    • DPA: 19
    • Leak-Inherent: 12
    • Physical Probing: 2
    • SPA: 26
    • Timing attack: 1
    • Timing attacks: 3
    • side channel: 15
    • side-channel: 7
    • timing attacks: 9
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 4
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 5
    • AIS32: 4
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 7816-3: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 5639: 1
    • RFC3447: 11
  • BSI:
    • AIS20: 2
    • AIS31: 3
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 3
  • FIPS:
    • FIPS 180-2: 2
    • FIPS PUB 180-2: 1
    • FIPS PUB 46-3: 2
    • FIPS PUB 81: 3
  • ISO:
    • ISO/IEC 15946-1: 1
    • ISO/IEC 15946-2: 1
  • PKCS:
    • PKCS #1: 6
pdf_data/st_metadata
  • /Author: Jürgen Noller
  • /CreationDate: D:20130128081309
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Common Criteria, chip card, secure controller, EAL5+, augmented, AVA_VAM.5, protection profile 0035
  • /ModDate: D:20130128081309
  • /Producer: Microsoft® Office Word 2007
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 885361
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 79
  • /Alternative descriptive title: Security Target Lite
  • /Author: NXP Semiconductors Andreas Kühn
  • /CertificationID: BSI-DSZ-CC-0549
  • /Chip family: SmartMX
  • /Chip type: P5CC024V0A
  • /Company: NXP Semiconductors
  • /Copyright date: 2008
  • /CreationDate: D:20080708140815+02'00'
  • /Creator: Acrobat PDFMaker 7.0.7 for Word
  • /Descriptive title: Security Target Lite
  • /Division: NXP Semiconductors
  • /Keywords: "Crypto Library, SmartMX, P5CC024, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA"; "Crypto Library, SmartMX, P5CC024, NXP, EAL5+, AVA_VLA.4, BSI-PP-0002-2001, Security Target, AES, DES, RSA, ECC over GF(p), SHA"
  • /ModDate: D:20081217162823+01'00'
  • /Modification date: 8 July 2008
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Revision: Rev. 1.0
  • /Security status: PUBLIC INFORMATION
  • /SourceModified: D:20080708113718
  • /Specification status: Evaluation documentation
  • /Status: Accepted
  • /Subject: Common Criteria Evaluation of Crypto Library on SmartMX
  • /TOE long: Secured Crypto Library on the P5CC024V0A
  • /TOE short: Crypto Library on SmartMX
  • /Template date: 1 October 2006
  • /Template version: 2.8.1
  • /Title: Security Target Lite - Secured Crypto Library on the P5CC024V0A
  • /docpath: I:\P5_CryptoLib\SmxCl\docs\02_sw_req_an
  • /philips_smx_cl_docpath: I:\P5_CryptoLib\SmxCl\docs\02_sw_req_an
  • /relBibilioPath: ..\Bibliography.doc
  • pdf_file_size_bytes: 616597
  • pdf_hyperlinks: http://www.cacr.math.uwaterloo.ca/hac/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 75
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different