| name |
NXP MIFARE Plus MF1PLUSx0y1 |
Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
DE |
DE |
| status |
archived |
archived |
| not_valid_after |
01.09.2019 |
09.09.2014 |
| not_valid_before |
02.11.2009 |
22.02.2013 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0586a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0586b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827b_pdf.pdf |
| manufacturer |
NXP Semiconductors |
Infineon Technologies AG |
| manufacturer_web |
https://www.nxp.com/ |
https://www.infineon.com/ |
| security_level |
EAL4+ |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
cc1ff2bdcf825c71 |
cac36ad3c18fbc02 |
| heuristics/cert_id |
BSI-DSZ-CC-0586-2009 |
BSI-DSZ-CC-0827-2013 |
| heuristics/cert_lab |
BSI |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_TDS.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ALC_LCD.1, ADV_FSP.4, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, ADV_INT.3, ASE_TSS.2, ALC_TAT.1, APE_CCL.1, AGD_OPE.1, ALC_CMS.4, APE_SPD.1, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2 |
ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, APE_REQ.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, ALC_TAT.2 |
| heuristics/extracted_versions |
- |
1.01.0008, 1.03.006 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0620-2010 |
BSI-DSZ-CC-0827-V2-2014 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0791-2012 |
| heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-0620-2010 |
BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0946-V3-2017, ANSSI-CC-2016/60, BSI-DSZ-CC-1158-V4-2025, BSI-DSZ-CC-1158-V3-2025, BSI-DSZ-CC-0827-V9-2024, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-0946-2014, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0946-V2-2015, CSEC2014007, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V5-2017, BSI-DSZ-CC-0827-V4-2016, ANSSI-CC-2019/38, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V6-2017 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0791-2012 |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
f6d23054061d72ba |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
0586a_pdf.pdf |
0827a_pdf.pdf |
| pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0586-2009
- cert_item: NXP MIFARE Plus MF1PLUSx0y1
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
- DE:
- cert_id: BSI-DSZ-CC-0827-2013
- cert_item: Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0586: 3
- BSI-DSZ-CC-0586-2009: 17
|
- DE:
- BSI-DSZ-CC-0791-2012: 3
- BSI-DSZ-CC-0827-2013: 23
- BSI-DSZ-CC-S-0007-2011: 1
- BSI-DSZ-CC-S-0015-2012: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0035: 1
- BSI-CC-PP-0035-: 1
- BSI-CC-PP-0035-2007: 2
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 8
- EAL 4 augmented: 3
- EAL 4+: 1
- EAL 7: 1
- EAL1: 6
- EAL2: 3
- EAL3: 4
- EAL4: 6
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 4: 3
- EAL 5: 8
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
- NXP:
- NXP: 15
- NXP Semiconductors: 16
- Philips:
|
- GD:
- Infineon:
- Infineon: 5
- Infineon Technologies: 17
- Infineon Technologies AG: 22
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA 1024: 1
- RSA-2048: 1
- RSA2048: 2
- RSA4096: 2
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 6
- physical tampering: 1
- SCA:
- DPA: 6
- SPA: 5
- physical probing: 1
- other:
|
| pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 3
- AIS 37: 1
|
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 31: 3
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- AIS31: 2
- AIS32: 1
- AIS47: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Report BSI-DSZ-CC-0586; Version 1.3; 12-11-2009; NXP MIFARE Plus MF1PLUSx0y1, T-Systems GEI GmbH, (confidential document) [10] MF1PLUSx0y1 and MF1SPLUS0y1 Configuration List, NXP Semiconductors, Rev. 1.5, 24 July 2009: 1
- Target BSI-DSZ-CC-0586, MIFARE Plus MF1PLUSx0y1, NXP Semiconductors, Rev. 1.3, 14th May 2009 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15.06.2007, registered and certified by: 1
|
- ConfidentialDocument:
- Informationstechnik GmbH (confidential document) [11] Configuration Management Scope M9900 A21 including optional Software Libraries RSA - EC –: 1
- Software Libraries RSA - EC – Toolbox – FTL, Version 1.3, 2013-01-22, Infineon Technologies AG (confidential document) [7] Security Target Lite M9900 A21 including optional Software Libraries RSA - EC – Toolbox – FTL: 1
- for the M9900 A21 with Crypto Libraries, Version 3, 2013-02-08, TÜV Informationstechnik GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the M9900 A21, Version 3, 2013-02-08: 1
- – FTL, Version 0.4, 2013-01-18, Document Title (confidential document) [12] SLE97 Asymmetric Crypto Library for Crypto@2304T RSA / ECC / Toolbox (1.03.006),2012-08-16: 1
|
| pdf_data/report_metadata |
- /Author: Bundesaamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20091119072447+01'00'
- /Creator: Writer
- /Keywords: "NXP MIFARE Plus MF1PLUSx0y1, NXP Semiconductors Germany GmbH, Common Criteria, Secure Smart Card Controller"
- /ModDate: D:20091119081033+01'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSz-CC-0586-2009
- pdf_file_size_bytes: 743603
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20130311160734+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software, Infineon Technologies AG"
- /ModDate: D:20130311161303+01'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0827-2013
- pdf_file_size_bytes: 1235472
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
| pdf_data/st_filename |
0586b_pdf.pdf |
0827b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 2
- EAL4: 29
- EAL4 augmented: 2
- EAL4+: 2
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 3
- EAL5: 6
- EAL5 augmented: 2
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.4: 2
- ALC_DEL.1: 2
- ALC_DVS.2: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 2
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 4
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1: 5
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.4: 7
- FCS_CKM.4.1: 1
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FCS_RNG.1: 5
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 10
- FDP_ITC.1: 4
- FDP_ITC.2: 12
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_ITT.1: 6
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 5
- FIA_UAU.5: 6
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 4
- FIA_UID.2: 8
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 3
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNL.1: 6
- FPR_UNL.1.1: 1
- FPT:
- FPT_FLS.1: 6
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FPT_RPL.1: 8
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 13
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 4
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 23
- FCS_CKM.1: 31
- FCS_CKM.2: 5
- FCS_CKM.4: 23
- FCS_COP: 47
- FCS_COP.1: 27
- FCS_RNG: 12
- FCS_RNG.1: 30
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.1.1: 1
- FDP_ACF.1: 20
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 10
- FDP_ITC.1: 17
- FDP_ITC.2: 17
- FDP_ITT.1: 13
- FDP_PHP.3: 1
- FDP_SDI.1: 17
- FDP_SDI.1.1: 1
- FDP_SDI.2: 15
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_SOS.2: 3
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 2
- FMT:
- FMT_LIM: 3
- FMT_LIM.1: 7
- FMT_LIM.2: 7
- FMT_MSA.1: 18
- FMT_MSA.1.1: 1
- FMT_MSA.3: 19
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 1
- FPT_FLS.1: 16
- FPT_ITT.1: 13
- FPT_LIM.2: 1
- FPT_PHP.3: 14
- FPT_TST: 7
- FPT_TST.1: 11
- FPT_TST.2: 36
- FPT_TST.2.1: 1
- FRU:
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
- NXP:
- NXP: 63
- NXP Semiconductors: 15
|
- Infineon:
- Infineon: 4
- Infineon Technologies: 2
- Infineon Technologies AG: 19
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA-2048: 1
- RSA2048: 2
- RSA4096: 2
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 9
- fault injection: 2
- malfunction: 2
- SCA:
- DPA: 1
- Leak-Inherent: 8
- Physical Probing: 2
- physical probing: 1
- timing attacks: 1
|
- FI:
- DFA: 7
- Malfunction: 12
- malfunction: 1
- SCA:
- DPA: 7
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 6
- Side-channel: 1
- Timing Attack: 1
- physical probing: 1
- side channel: 6
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCIMB-2007-09-004: 2
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- FIPS:
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- ISO:
- PKCS:
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: NXP Business Line Identification - HGA, KKG
- /CreationDate: D:20090929084612+02'00'
- /Creator: Acrobat PDFMaker 8.1 for Word
- /Keywords: MIFARE Plus, Secure Smart Card Controller
- /ModDate: D:20091118132313+01'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /SourceModified: D:20090929063900
- /Subject: MF1PLUSx0y1
- /Title: Security Target
- pdf_file_size_bytes: 553578
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 53
|
- /Author: Jürgen Noller
- /CreationDate: D:20130128081309
- /Creator: Microsoft® Office Word 2007
- /Keywords: Common Criteria, chip card, secure controller, EAL5+, augmented, AVA_VAM.5, protection profile 0035
- /ModDate: D:20130128081309
- /Producer: Microsoft® Office Word 2007
- /Title: Security Target Lite
- pdf_file_size_bytes: 885361
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 79
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |