Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
BSI-DSZ-CC-0973-V2-2016
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software
BSI-DSZ-CC-1072-V2-2019
name NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software
not_valid_before 2016-10-11 2019-06-27
not_valid_after 2021-10-11 2024-06-27
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1072V2b_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1072V2a_pdf.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1072V2c_pdf.pdf
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None c7c18e4481cac1996ffd173272bcdd9b8eda7441d542e5740e5856fc7e13d2f4
state/cert/txt_hash None 551f176d9ac8fa921a0ae46a73b01b5dd9920a346cc2531162652db461f321aa
state/report/pdf_hash 052f73d525607b99d226263203b8fe795051fbb8cefd76104f0f903ccf524c72 5014117432067326cec7b9db089a086e269c6916eec4e40716e2ada85b27c6e0
state/report/txt_hash 0cc5786a58105372dc2412cf2e10e72a8bc15a41491f706651056b1bcf214c57 1167c73570b672965e0a1746163a29e20f28a30cf71528236417b8b2a4a9c5e2
state/st/pdf_hash 7219d7a2224b312ce746075874113349d0d1e8cfd5b4813a11380f2afb8ffa78 bc056902b5829c0766f87b7c087b4ca536062703e0fc0fa14daf93d5f195df34
state/st/txt_hash 8770273c851f45d92942a55366a87b11757985ce578572e639ebcba897ac3de4 a15c0899a00305f9da0ca81b1da3c63b25263d827e431ae1c08ac02cab5989ba
heuristics/cert_id BSI-DSZ-CC-0973-V2-2016 BSI-DSZ-CC-1072-V2-2019
heuristics/extracted_versions 5, 2, 1 -
heuristics/report_references/directly_referenced_by ANSSI-CC-2018/03, ANSSI-CC-2017/72, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0996-2018, ANSSI-CC-2017/49, ANSSI-CC-2017/68, ANSSI-CC-2017/69, ANSSI-CC-2018/06, BSI-DSZ-CC-0995-2018, BSI-DSZ-CC-1022-2018, ANSSI-CC-2018/05, ANSSI-CC-2017/70, BSI-DSZ-CC-1024-2018, ANSSI-CC-2017/71, BSI-DSZ-CC-1023-2018, ANSSI-CC-2018/04, BSI-DSZ-CC-1001-2018 BSI-DSZ-CC-1072-V3-2019
heuristics/report_references/directly_referencing BSI-DSZ-CC-0973-2016 BSI-DSZ-CC-1072-2018
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2020/26, BSI-DSZ-CC-1148-V2-2023, ANSSI-CC-2019/43-R01, BSI-DSZ-CC-1147-V2-2023, BSI-DSZ-CC-1059-V2-2019, ANSSI-CC-2020/53-R01, ANSSI-CC-2017/49, ANSSI-CC-2020/50-R01, ANSSI-CC-2020/53, ANSSI-CC-2020/51-R01, NSCIB-CC-23-67206-CR, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1118-2020, BSI-DSZ-CC-1121-V2-2021, ANSSI-CC-2017/71, BSI-DSZ-CC-1034-2019, ANSSI-CC-2020/50, BSI-DSZ-CC-1059-V3-2019, ANSSI-CC-2019/34, ANSSI-CC-2020/51, BSI-DSZ-CC-1103-2019, ANSSI-CC-2019/50, BSI-DSZ-CC-1065-2020, ANSSI-CC-2019/36, ANSSI-CC-2019/48, ANSSI-CC-2020/36, BSI-DSZ-CC-1147-V3-2023, BSI-DSZ-CC-1078-2019, ANSSI-CC-2020/26-R01, ANSSI-CC-2018/06, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2022/33, BSI-DSZ-CC-1148-2020, BSI-DSZ-CC-1059-V5-2022, ANSSI-CC-2020/35, BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1064-2020, ANSSI-CC-2018/15, NSCIB-CC-2200035-01-CR, BSI-DSZ-CC-1148-V3-2023, ANSSI-CC-2018/18, BSI-DSZ-CC-1001-2018, BSI-DSZ-CC-1059-2018, ANSSI-CC-2017/69, ANSSI-CC-2019/43, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1034-V2-2021, BSI-DSZ-CC-1147-2020, ANSSI-CC-2019/35, BSI-DSZ-CC-0996-2018, ANSSI-CC-2017/68, ANSSI-CC-2018/17, ANSSI-CC-2017/72, ANSSI-CC-2019/33, ANSSI-CC-2020/46, BSI-DSZ-CC-0995-2018, ANSSI-CC-2020/48, ANSSI-CC-2020/52-R01, ANSSI-CC-2019/28, ANSSI-CC-2019/47, ANSSI-CC-2019/49, ANSSI-CC-2020/38, ANSSI-CC-2017/70, BSI-DSZ-CC-1059-V4-2021, ANSSI-CC-2018/04, ANSSI-CC-2020/52, ANSSI-CC-2023/38, ANSSI-CC-2018/05, ANSSI-CC-2018/16, BSI-DSZ-CC-1023-2018, ANSSI-CC-2020/47, ANSSI-CC-2018/03, BSI-DSZ-CC-1211-2023, NSCIB-CC-98209-CR5, ANSSI-CC-2019/41, ANSSI-CC-2020/37 BSI-DSZ-CC-1072-V5-2022, NSCIB-CC-23-66030-CR, BSI-DSZ-CC-1072-V4-2021, BSI-DSZ-CC-1072-V3-2019
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0973-2016 BSI-DSZ-CC-1072-2018, BSI-DSZ-CC-0955-2016, BSI-DSZ-CC-0955-V2-2016
heuristics/st_references/directly_referenced_by BSI-DSZ-CC-1023-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1022-2018 None
heuristics/st_references/indirectly_referenced_by BSI-DSZ-CC-1023-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1022-2018 None
pdf_data/cert_filename None 1072V2c_pdf.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • DE:
      • BSI-DSZ-CC-1072-V2-2019: 1
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0084-2014: 1
  • cc_security_level:
    • EAL:
      • EAL 6: 1
      • EAL 5: 1
      • EAL 2: 1
      • EAL 6 augmented: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.1: 1
      • ALC_FLR: 1
    • ASE:
      • ASE_TSS.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
    • NXP:
      • NXP: 1
      • NXP Semiconductors: 1
  • eval_facility:
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
    • ISO:
      • ISO/IEC 15408: 2
      • ISO/IEC 18045: 2
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 341900
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20190702130859+02'00'
  • /Creator: Writer
  • /ModDate: D:20190702130951+02'00'
  • /Producer: LibreOffice 5.2
  • /Subject: NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software
  • /Title: Certification Report BSI-DSZ-CC-1072-V2-2019
  • pdf_hyperlinks:
pdf_data/report_filename 0973V2a_pdf.pdf 1072V2a_pdf.pdf
pdf_data/report_frontpage/DE/cc_security_level Common Criteria Part 3 conformant P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0973-V2-2016 BSI-DSZ-CC-1072-V2-2019
pdf_data/report_frontpage/DE/cert_item NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0973-V2-2016: 25
  • BSI-DSZ-CC-0973-2016: 2
  • BSI-DSZ-CC-1072-V2-2019: 18
  • BSI-DSZ-CC-1072-2018: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 3
    • ADV_IMP.2: 2
    • ADV_INT.3: 2
    • ADV_SPM.1: 2
    • ADV_TDS.5: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_INT.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 6
    • ALC_DVS.2: 8
    • ALC_FLR: 3
    • ALC_CMC.5: 3
    • ALC_CMS.5: 4
    • ALC_TAT.3: 3
    • ALC_TAT.2: 4
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 3
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 2
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.3: 2
    • ATE_DPT.3: 3
    • ATE_FUN.2: 2
    • ATE_IND: 2
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
  • AVA:
    • AVA_VAN.5: 7
    • AVA_VAN: 3
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_TSS.2: 9
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ALC:
    • ALC_FLR.1: 4
    • ALC_FLR: 3
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_TSS.2: 4
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.1: 6
  • ALC_DVS.2: 8
  • ALC_FLR: 3
  • ALC_CMC.5: 3
  • ALC_CMS.5: 4
  • ALC_TAT.3: 3
  • ALC_TAT.2: 4
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 3
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 2
  • ALC_DVS.1: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 2
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 2
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_FLR.1: 4
  • ALC_FLR: 3
  • ALC_CMC.5: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 4 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 8 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 6 4
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 3 1
pdf_data/report_keywords/cc_sar/ASE
  • ASE_TSS.2: 9
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_TSS.2: 4
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 9 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL6: 4
    • EAL 5: 14
    • EAL 2: 7
    • EAL 1: 7
    • EAL 4: 6
    • EAL 6: 5
    • EAL 5+: 1
    • EAL 3: 4
    • EAL 7: 4
    • EAL6 augmented: 3
    • EAL 5 augmented: 3
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 6: 5
    • EAL 5: 4
    • EAL 2: 2
    • EAL 1: 1
    • EAL 4: 1
    • EAL 2+: 1
    • EAL 5+: 1
    • EAL 6 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL6: 4
  • EAL 5: 14
  • EAL 2: 7
  • EAL 1: 7
  • EAL 4: 6
  • EAL 6: 5
  • EAL 5+: 1
  • EAL 3: 4
  • EAL 7: 4
  • EAL6 augmented: 3
  • EAL 5 augmented: 3
  • EAL 6: 5
  • EAL 5: 4
  • EAL 2: 2
  • EAL 1: 1
  • EAL 4: 1
  • EAL 2+: 1
  • EAL 5+: 1
  • EAL 6 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 7 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 7 2
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 6 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 14 4
pdf_data/report_keywords/cc_sfr
  • FTP:
    • FTP_TRP.1: 2
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • 1.52, 2016-07-27, NXP Secure Smart Card Controller P6022y VB Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 1, 2016-08-25, EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
  • TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • Evaluation (ETR COMP) for the P6022y VB, version 1, 2016-08-25, TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • Smart Card Controller P6021y VB – Security Target, Version 1.8, 2018-11-21, NXP Semiconductors (confidential document) [7] Evaluation Technical Report BSI-DSZ-CC-1072-V2-2019, Version 2, 2019-04-29, TÜV: 1
  • GmbH , (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • Evaluation (ETR COMP) for the P6021y VB, version 3, 2018-05-07, TÜV Informationstechnik GmbH (confidential document) [11] SmartMX2 family P6021y VB Secure high-performance smart card controller, Objective data sheet: 1
  • Card Controller P6021y VB Evaluation Reference List, Version 2.02, 2019-04-05, NXP Semiconductors (confidential document) [19] Evaluation Technical Report for Composite Evaluation Addendum (ETR-COMP- ADD: 1
  • Version 2, 2019-04-29, TÜV Informationstechnik GmbH (confidential document) • AIS 38, Version 2, Reuse of evaluation results • AIS39, Formal Method, Version 3.0, 24.10.2008 •: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 3
  • CBC:
    • CBC: 10
  • ECB:
    • ECB: 5
pdf_data/report_keywords/cipher_mode/ECB/ECB 3 5
pdf_data/report_keywords/crypto_engine/SmartMX/SmartMX2 5 8
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik 4 5
pdf_data/report_keywords/randomness/RNG/RNG 3 4
pdf_data/report_keywords/randomness/TRNG/TRNG 1 2
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
    • SPA: 1
    • DPA: 1
  • other:
    • JIL: 3
  • SCA:
    • physical probing: 1
  • FI:
    • physical tampering: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/side_channel_analysis/SCA
  • physical probing: 1
  • SPA: 1
  • DPA: 1
  • physical probing: 1
pdf_data/report_keywords/side_channel_analysis/other/JIL 3 4
pdf_data/report_keywords/standard_id
  • NIST:
    • NIST SP 800-67: 3
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 37: 2
    • AIS 31: 2
    • AIS 36: 1
    • AIS31: 1
    • AIS 35: 2
    • AIS 26: 1
    • AIS 32: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 14443: 6
    • ISO/IEC 7816: 2
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 37: 1
    • AIS 31: 3
    • AIS 36: 2
    • AIS31: 2
    • AIS 35: 2
    • AIS 1: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS39: 1
    • AIS46: 1
    • AIS 47: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 37: 2
  • AIS 31: 2
  • AIS 36: 1
  • AIS31: 1
  • AIS 35: 2
  • AIS 26: 1
  • AIS 32: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 37: 1
  • AIS 31: 3
  • AIS 36: 2
  • AIS31: 2
  • AIS 35: 2
  • AIS 1: 1
  • AIS 26: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS39: 1
  • AIS46: 1
  • AIS 47: 1
pdf_data/report_keywords/standard_id/BSI/AIS 31 2 3
pdf_data/report_keywords/standard_id/BSI/AIS 36 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 37 2 1
pdf_data/report_keywords/standard_id/BSI/AIS31 1 2
pdf_data/report_keywords/standard_id/ISO/ISO/IEC 14443 6 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 17
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • TDES: 2
      • Triple-DES: 6
  • constructions:
    • MAC:
      • CMAC: 4
  • AES_competition:
    • AES:
      • AES: 7
  • DES:
    • DES:
      • DES: 4
    • 3DES:
      • TDES: 1
      • Triple-DES: 3
      • TDEA: 1
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 17 7
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • TDES: 2
  • Triple-DES: 6
  • TDES: 1
  • Triple-DES: 3
  • TDEA: 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/TDES 2 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 6 3
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 5 4
pdf_data/report_keywords/vendor/NXP/NXP 21 28
pdf_data/report_keywords/vendor/NXP/NXP Semiconductors 35 26
pdf_data/report_metadata//CreationDate D:20161019121338+02'00' D:20190702125234+02'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Smartcard, NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software, NXP Semiconductors Germany GmbH" "Common Criteria, Certification, Zertifizierung, Smart Card Controller, NXP, EAL6, P60021yVB*"
pdf_data/report_metadata//ModDate D:20161020141130+02'00' D:20190702130732+02'00'
pdf_data/report_metadata//Producer LibreOffice 4.2 LibreOffice 5.2
pdf_data/report_metadata//Subject Common Criteria Certification NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0973-V2-2016 Certification Report BSI-DSZ-CC-1072-V2-2019
pdf_data/report_metadata/pdf_file_size_bytes 1339836 899075
pdf_data/report_metadata/pdf_number_of_pages 44 29
pdf_data/st_filename 0973V2b_pdf.pdf 1072V2b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 3 2
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1072: 1
pdf_data/st_keywords/cc_claims/O
  • O.RND: 3
  • O.TDES: 6
  • O.AES: 6
  • O.CUST_RECONF_PLAIN: 6
  • O.EEPROM_INTEGRITY: 5
  • O.FM_FW: 9
  • O.MEM_ACCESS: 10
  • O.SFR_ACCESS: 9
  • O.PUF: 6
  • O.CUST_RECONF_MIFARE: 6
  • O.ACCESS-CONTROL: 8
  • O.AUTHENTICATION: 7
  • O.ENCRYPTION: 6
  • O.MAC: 6
  • O.TYPE-CONSISTENCY: 4
  • O.DF-TRANSACTION: 4
  • O.TYPE-: 2
  • O.ACCESS-: 1
  • O.DF-: 2
  • O.RND: 3
  • O.TDES: 7
  • O.AES: 7
  • O.CUST_RECONF_PLAIN: 6
  • O.EEPROM_INTEGRITY: 5
  • O.FM_FW: 9
  • O.MEM_ACCESS: 10
  • O.SFR_ACCESS: 8
  • O.PUF: 6
  • O.SFR_: 1
pdf_data/st_keywords/cc_claims/O/O.AES 6 7
pdf_data/st_keywords/cc_claims/O/O.SFR_ACCESS 9 8
pdf_data/st_keywords/cc_claims/O/O.TDES 6 7
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 2
  • ADV_FSP.5: 22
  • ADV_IMP.2: 4
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 1
  • ADV_ARC: 2
  • ADV_FSP: 8
  • ADV_IMP: 2
  • ADV_FSP.4: 6
  • ADV_SPM: 2
  • ADV_IMP.1: 1
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_ARC.1: 1
  • ADV_FSP.5: 11
  • ADV_IMP.2: 3
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 1
  • ADV_ARC: 1
  • ADV_FSP: 3
  • ADV_IMP: 1
  • ADV_FSP.4: 3
  • ADV_SPM: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP 8 3
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 6 3
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 22 11
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 4 3
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 2 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 6
  • ALC_DVS.2: 5
  • ALC_CMC.5: 4
  • ALC_CMS.5: 10
  • ALC_DEL.1: 2
  • ALC_LCD.1: 2
  • ALC_TAT.3: 1
  • ALC_DEL: 2
  • ALC_DVS: 2
  • ALC_CMS: 8
  • ALC_CMC: 5
  • ALC_CMS.4: 6
  • ALC_CMC.4: 4
  • ALC_TAT.2: 1
  • ALC_FLR.1: 6
  • ALC_CMC.5: 4
  • ALC_CMS.5: 5
  • ALC_DEL.1: 1
  • ALC_DVS.2: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_CMS: 3
  • ALC_CMC: 3
  • ALC_CMS.4: 3
  • ALC_CMC.4: 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC 5 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 4 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS 8 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 6 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 10 5
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 5 1
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 2 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_TSS.2: 10
  • ASE_CCL.1: 2
  • ASE_ECD.1: 2
  • ASE_INT.1: 2
  • ASE_OBJ.2: 2
  • ASE_REQ.2: 2
  • ASE_SPD.1: 2
  • ASE_TSS: 2
  • ASE_TSS.2: 6
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.2 10 6
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.3: 4
  • ATE_DPT.3: 2
  • ATE_FUN.2: 1
  • ATE_IND.2: 2
  • ATE_COV: 2
  • ATE_COV.2: 1
  • ATE_FUN.1: 1
  • ATE_COV.3: 3
  • ATE_DPT.3: 1
  • ATE_FUN.2: 1
  • ATE_IND.2: 1
  • ATE_COV: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV 2 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.3 4 3
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 2 1
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 2 1
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN 2 1
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 7 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6: 42
  • EAL5: 38
  • EAL6+: 13
  • EAL5+: 18
  • EAL4: 1
  • EAL4+: 3
  • EAL6 augmented: 4
  • EAL5 augmented: 2
  • EAL4 augmented: 1
  • EAL6: 44
  • EAL6+: 11
  • EAL4: 1
  • EAL4+: 2
  • EAL6 augmented: 5
  • EAL4 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL4+ 3 2
pdf_data/st_keywords/cc_security_level/EAL/EAL6 42 44
pdf_data/st_keywords/cc_security_level/EAL/EAL6 augmented 4 5
pdf_data/st_keywords/cc_security_level/EAL/EAL6+ 13 11
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 35 17
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 64 46
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 5 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 88 45
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 7 4
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_SDC.1: 16
  • FDP_SDI.2: 36
  • FDP_ITT.1: 6
  • FDP_IFC.1: 20
  • FDP_SDI.1: 5
  • FDP_SDI.2.1: 5
  • FDP_SDI.2.2: 5
  • FDP_SDC.1.1: 2
  • FDP_ITC.1: 24
  • FDP_ITC.2: 44
  • FDP_ACC.1: 74
  • FDP_ACC.1.1: 4
  • FDP_ACF.1: 56
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_ITC.2.1: 2
  • FDP_ITC.2.2: 2
  • FDP_ITC.2.3: 2
  • FDP_ITC.2.4: 2
  • FDP_ITC.2.5: 2
  • FDP_ROL.1: 7
  • FDP_ROL.1.1: 1
  • FDP_ROL.1.2: 1
  • FDP_SDC.1: 16
  • FDP_SDI.2: 36
  • FDP_ITT.1: 6
  • FDP_IFC.1: 10
  • FDP_SDI.1: 5
  • FDP_SDI.2.1: 5
  • FDP_SDI.2.2: 5
  • FDP_SDC.1.1: 2
  • FDP_ITC.1: 14
  • FDP_ITC.2: 16
  • FDP_ACC.1: 37
  • FDP_ACC.1.1: 2
  • FDP_ACF.1: 34
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 2
  • FDP_ACF.1.4: 2
  • FDP_ROL.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 74 37
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 56 34
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 20 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 24 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 44 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL.1 7 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.1: 10
  • FIA_UID.2: 17
  • FIA_UAU.2: 15
  • FIA_UAU.1: 2
  • FIA_UAU.5: 12
  • FIA_UAU.5.1: 2
  • FIA_UAU.5.2: 2
  • FIA_UAU.4: 1
  • FIA_UID.2: 2
  • FIA_UAU.2: 2
  • FIA_UAU.5: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 15 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 12 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 17 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM.1: 3
  • FMT_LIM.2: 4
  • FMT_MSA.3: 46
  • FMT_MSA.3.1: 4
  • FMT_MSA.3.2: 4
  • FMT_MSA.1: 51
  • FMT_SMR.1: 32
  • FMT_MSA.1.1: 4
  • FMT_SMF.1: 43
  • FMT_SMF.1.1: 3
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_LIM.1: 3
  • FMT_LIM.2: 4
  • FMT_MSA.3: 24
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MSA.1: 28
  • FMT_MSA.1.1: 2
  • FMT_SMR.1: 7
  • FMT_SMF.1: 22
  • FMT_SMF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 51 28
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 4 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 46 24
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 4 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 4 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 43 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 3 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 32 7
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 8
  • FPT_PHP.3: 8
  • FPT_ITT.1: 6
  • FPT_TDC.1: 19
  • FPT_TDC.1.1: 2
  • FPT_TDC.1.2: 2
  • FPT_RPL.1: 16
  • FPT_RPL.1.1: 2
  • FPT_RPL.1.2: 2
  • FPT_FLS.1: 8
  • FPT_PHP.3: 8
  • FPT_ITT.1: 6
  • FPT_TDC.1: 2
  • FPT_RPL.1: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 16 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1 19 2
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 4
  • FTP_TRP.1: 26
  • FTP_TRP.1.1: 2
  • FTP_TRP.1.2: 2
  • FTP_TRP.1.3: 7
  • FTP_ROL.1: 1
  • FTP_TRP.1: 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 26 2
pdf_data/st_keywords/cipher_mode/CBC/CBC 13 4
pdf_data/st_keywords/crypto_engine/SmartMX/SmartMX2 13 11
pdf_data/st_keywords/crypto_scheme/MAC/MAC 23 8
pdf_data/st_keywords/randomness/RNG/RNG 16 14
pdf_data/st_keywords/standard_id/BSI
  • AIS20: 2
  • AIS31: 4
  • AIS31: 2
pdf_data/st_keywords/standard_id/BSI/AIS31 4 2
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
pdf_data/st_keywords/standard_id/FIPS/FIPS 197 5 3
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 3 2
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 14443 24 20
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 7816 28 24
pdf_data/st_keywords/standard_id/NIST
  • NIST SP 800-67: 6
  • NIST SP 800-38A: 6
  • NIST SP 800-38B: 2
  • NIST SP 800-67: 4
  • NIST SP 800-38A: 3
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-38A 6 3
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-67 6 4
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 122 82
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 51 45
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 30 19
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 6 8
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • CBC-MAC: 2
  • CMAC: 9
  • CBC-MAC: 2
pdf_data/st_keywords/vendor/NXP/NXP 180 204
pdf_data/st_keywords/vendor/NXP/NXP Semiconductors 50 36
pdf_data/st_keywords/vendor/NXP/NXP Semiconductors N.V 130 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 854200
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 130
  • /Author: NXP Semiconductors
  • /CreationDate: D:20160816135914+02'00'
  • /Creator: DITA Open Toolkit
  • /Keywords: CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB
  • /ModDate: D:20160816135946+02'00'
  • /PDFVersion: 1.4
  • /Producer: Apache FOP Version 1.1
  • /Subject: NXP Secure Smart Card Controller P6022y VB
  • /Title: Security Target Lite
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 727734
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 97
  • /Title: Security Target Lite
  • /Author: NXP B.V.
  • /Subject: NXP Secure Smart Card Controller P6021y VB
  • /Keywords: CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6021y VB, P6021P VB, P6021M VB, P6021D VB, P6021J VB
  • /Creator: DITA Open Toolkit
  • /Producer: Apache FOP Version 1.1
  • /CreationDate: D:20190122162315Z
  • pdf_hyperlinks:
pdf_data/st_metadata//Author NXP Semiconductors NXP B.V.
pdf_data/st_metadata//CreationDate D:20160816135914+02'00' D:20190122162315Z
pdf_data/st_metadata//Keywords CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6021y VB, P6021P VB, P6021M VB, P6021D VB, P6021J VB
pdf_data/st_metadata//Subject NXP Secure Smart Card Controller P6022y VB NXP Secure Smart Card Controller P6021y VB
pdf_data/st_metadata/pdf_file_size_bytes 854200 727734
pdf_data/st_metadata/pdf_number_of_pages 130 97
dgst cdffae2b624bf6c7 2ff1474b4f717192