Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
BSI-DSZ-CC-0973-V2-2016
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software
BSI-DSZ-CC-1072-V4-2021
name NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software
not_valid_before 2016-10-11 2021-06-24
not_valid_after 2021-10-11 2026-06-24
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973V2b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1072V4b_pdf.pdf
status archived active
manufacturer NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity NXP Semiconductors Germany GmbH
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973V2a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1072V4a_pdf.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1072V4c_pdf.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2021, 12, 17), 'maintenance_title': 'NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1072V4ma1a_pdf.pdf', 'maintenance_st_link': None})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None 41e6049798a17e087b938f5159cee32b7c9d40445b1b1ce5eb19951bdf92ccfa
state/cert/txt_hash None 4db6c42896fbfb45792aa7c4d4374491ba969541dfa62f0aedb4591f385e0875
state/report/pdf_hash 052f73d525607b99d226263203b8fe795051fbb8cefd76104f0f903ccf524c72 2f59739a0c02428ea87e32b9af790a6f656c46e5d260201ded4e6c6163713f2f
state/report/txt_hash 0cc5786a58105372dc2412cf2e10e72a8bc15a41491f706651056b1bcf214c57 af044c8e5c568f40d5d7ff9eca7c9595c97707c0e1ca341d34aeba2b891ca4a9
state/st/pdf_hash 7219d7a2224b312ce746075874113349d0d1e8cfd5b4813a11380f2afb8ffa78 38284dbad06071681edef6fcd384d99b909436d27e47c78237bf7f5c0555009b
state/st/txt_hash 8770273c851f45d92942a55366a87b11757985ce578572e639ebcba897ac3de4 817a84c31a994cfd29586dcd049e20a694bcc7302c1bd4f593d907a0e88f34a9
heuristics/cert_id BSI-DSZ-CC-0973-V2-2016 BSI-DSZ-CC-1072-V4-2021
heuristics/extracted_versions 5, 2, 1 -
heuristics/report_references/directly_referenced_by ANSSI-CC-2018/03, ANSSI-CC-2017/72, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0996-2018, ANSSI-CC-2017/49, ANSSI-CC-2017/68, ANSSI-CC-2017/69, ANSSI-CC-2018/06, BSI-DSZ-CC-0995-2018, BSI-DSZ-CC-1022-2018, ANSSI-CC-2018/05, ANSSI-CC-2017/70, BSI-DSZ-CC-1024-2018, ANSSI-CC-2017/71, BSI-DSZ-CC-1023-2018, ANSSI-CC-2018/04, BSI-DSZ-CC-1001-2018 BSI-DSZ-CC-1072-V5-2022
heuristics/report_references/directly_referencing BSI-DSZ-CC-0973-2016 BSI-DSZ-CC-1072-V3-2019
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2020/26, BSI-DSZ-CC-1148-V2-2023, ANSSI-CC-2019/43-R01, BSI-DSZ-CC-1147-V2-2023, BSI-DSZ-CC-1059-V2-2019, ANSSI-CC-2020/53-R01, ANSSI-CC-2017/49, ANSSI-CC-2020/50-R01, ANSSI-CC-2020/53, ANSSI-CC-2020/51-R01, NSCIB-CC-23-67206-CR, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1118-2020, BSI-DSZ-CC-1121-V2-2021, ANSSI-CC-2017/71, BSI-DSZ-CC-1034-2019, ANSSI-CC-2020/50, BSI-DSZ-CC-1059-V3-2019, ANSSI-CC-2019/34, ANSSI-CC-2020/51, BSI-DSZ-CC-1103-2019, ANSSI-CC-2019/50, BSI-DSZ-CC-1065-2020, ANSSI-CC-2019/36, ANSSI-CC-2019/48, ANSSI-CC-2020/36, BSI-DSZ-CC-1147-V3-2023, BSI-DSZ-CC-1078-2019, ANSSI-CC-2020/26-R01, ANSSI-CC-2018/06, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2022/33, BSI-DSZ-CC-1148-2020, BSI-DSZ-CC-1059-V5-2022, ANSSI-CC-2020/35, BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1064-2020, ANSSI-CC-2018/15, NSCIB-CC-2200035-01-CR, BSI-DSZ-CC-1148-V3-2023, ANSSI-CC-2018/18, BSI-DSZ-CC-1001-2018, BSI-DSZ-CC-1059-2018, ANSSI-CC-2017/69, ANSSI-CC-2019/43, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1034-V2-2021, BSI-DSZ-CC-1147-2020, ANSSI-CC-2019/35, BSI-DSZ-CC-0996-2018, ANSSI-CC-2017/68, ANSSI-CC-2018/17, ANSSI-CC-2017/72, ANSSI-CC-2019/33, ANSSI-CC-2020/46, BSI-DSZ-CC-0995-2018, ANSSI-CC-2020/48, ANSSI-CC-2020/52-R01, ANSSI-CC-2019/28, ANSSI-CC-2019/47, ANSSI-CC-2019/49, ANSSI-CC-2020/38, ANSSI-CC-2017/70, BSI-DSZ-CC-1059-V4-2021, ANSSI-CC-2018/04, ANSSI-CC-2020/52, ANSSI-CC-2023/38, ANSSI-CC-2018/05, ANSSI-CC-2018/16, BSI-DSZ-CC-1023-2018, ANSSI-CC-2020/47, ANSSI-CC-2018/03, BSI-DSZ-CC-1211-2023, NSCIB-CC-98209-CR5, ANSSI-CC-2019/41, ANSSI-CC-2020/37 BSI-DSZ-CC-1072-V5-2022, NSCIB-CC-23-66030-CR
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0973-2016 BSI-DSZ-CC-0955-2016, BSI-DSZ-CC-1072-2018, BSI-DSZ-CC-1072-V2-2019, BSI-DSZ-CC-0955-V2-2016, BSI-DSZ-CC-1072-V3-2019
heuristics/st_references/directly_referenced_by BSI-DSZ-CC-1023-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1022-2018 NSCIB-CC-127667-CR3
heuristics/st_references/indirectly_referenced_by BSI-DSZ-CC-1023-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1022-2018 NSCIB-CC-127667-CR3
pdf_data/cert_filename None 1072V4c_pdf.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • DE:
      • BSI-DSZ-CC-1072-V4-2021: 1
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0084-2014: 1
  • cc_security_level:
    • EAL:
      • EAL 6: 1
      • EAL 5: 1
      • EAL 2: 1
      • EAL 6 augmented: 1
  • cc_sar:
    • ALC:
      • ALC_FLR.1: 1
      • ALC_FLR: 1
    • ASE:
      • ASE_TSS.2: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
    • NXP:
      • NXP: 1
      • NXP Semiconductors: 1
  • eval_facility:
  • symmetric_crypto:
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
    • ISO:
      • ISO/IEC 15408: 2
      • ISO/IEC 18045: 2
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 241228
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20210629101754+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6021y VB*including IC Dedicated Software, NXP Semiconductors Germany GmbH"
  • /ModDate: D:20210629102142+02'00'
  • /Producer: LibreOffice 6.3
  • /Subject: BSI-DSZ-CC-1072-V4-2021, NXP Secure Smart Card Controller P6021y VB*including IC Dedicated Software, Common Criteria
  • /Title: Certificate BSI-DSZ-CC-1072-V4-2021
  • pdf_hyperlinks:
pdf_data/report_filename 0973V2a_pdf.pdf 1072V4a_pdf.pdf
pdf_data/report_frontpage/DE/cc_security_level Common Criteria Part 3 conformant P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 Common Criteria Part 3 extended EAL 6 augmented by ASE_TSS.2 and ALC_FLR.1
pdf_data/report_frontpage/DE/cert_id BSI-DSZ-CC-0973-V2-2016 BSI-DSZ-CC-1072-V4-2021
pdf_data/report_frontpage/DE/cert_item NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0973-V2-2016: 25
  • BSI-DSZ-CC-0973-2016: 2
  • BSI-DSZ-CC-1072-V4-2021: 19
  • BSI-DSZ-CC-1072-V3-2019: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.5: 3
    • ADV_IMP.2: 2
    • ADV_INT.3: 2
    • ADV_SPM.1: 2
    • ADV_TDS.5: 2
    • ADV_INT.2: 2
    • ADV_TDS.4: 2
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_INT.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 6
    • ALC_DVS.2: 8
    • ALC_FLR: 3
    • ALC_CMC.5: 3
    • ALC_CMS.5: 4
    • ALC_TAT.3: 3
    • ALC_TAT.2: 4
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 3
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 2
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.3: 2
    • ATE_DPT.3: 3
    • ATE_FUN.2: 2
    • ATE_IND: 2
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
  • AVA:
    • AVA_VAN.5: 7
    • AVA_VAN: 3
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_TSS.2: 9
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ALC:
    • ALC_FLR.1: 4
    • ALC_FLR: 3
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_TSS.2: 4
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.1: 6
  • ALC_DVS.2: 8
  • ALC_FLR: 3
  • ALC_CMC.5: 3
  • ALC_CMS.5: 4
  • ALC_TAT.3: 3
  • ALC_TAT.2: 4
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 3
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 2
  • ALC_DVS.1: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 2
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 2
  • ALC_DVS: 1
  • ALC_TAT: 1
  • ALC_FLR.1: 4
  • ALC_FLR: 3
  • ALC_CMC.5: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 3 1
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 4 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 8 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 6 4
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 2 1
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 3 1
pdf_data/report_keywords/cc_sar/ASE
  • ASE_TSS.2: 9
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_TSS.2: 4
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 9 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL6: 4
    • EAL 5: 14
    • EAL 2: 7
    • EAL 1: 7
    • EAL 4: 6
    • EAL 6: 5
    • EAL 5+: 1
    • EAL 3: 4
    • EAL 7: 4
    • EAL6 augmented: 3
    • EAL 5 augmented: 3
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 6: 5
    • EAL 5: 4
    • EAL 2: 2
    • EAL 1: 1
    • EAL 4: 1
    • EAL 2+: 1
    • EAL 5+: 1
    • EAL 6 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL
  • EAL6: 4
  • EAL 5: 14
  • EAL 2: 7
  • EAL 1: 7
  • EAL 4: 6
  • EAL 6: 5
  • EAL 5+: 1
  • EAL 3: 4
  • EAL 7: 4
  • EAL6 augmented: 3
  • EAL 5 augmented: 3
  • EAL 6: 5
  • EAL 5: 4
  • EAL 2: 2
  • EAL 1: 1
  • EAL 4: 1
  • EAL 2+: 1
  • EAL 5+: 1
  • EAL 6 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 7 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 7 2
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 6 1
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 14 4
pdf_data/report_keywords/cc_sfr
  • FTP:
    • FTP_TRP.1: 2
pdf_data/report_keywords/certification_process/ConfidentialDocument
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • 1.52, 2016-07-27, NXP Secure Smart Card Controller P6022y VB Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 1, 2016-08-25, EVALUATION TECHNICAL REPORT SUMMARY (ETR: 1
  • TÜV Informationstechnik GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • Evaluation (ETR COMP) for the P6022y VB, version 1, 2016-08-25, TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL: 1
  • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
  • Smart Card Controller P6021y VB – Security Target, Version 1.11, 2019-08-23, NXP Semiconductors (confidential document) [7] Evaluation Technical Report BSI-DSZ-CC-1072-V4-2021, Version 3, 2021-06-16, TÜV: 1
  • GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
  • Evaluation (ETR COMP) for the P6021y VB, version 3, 2021-06-16, TÜV Informationstechnik GmbH (confidential document) [11] SmartMX2 family P6021y VB Secure high-performance smart card controller, Objective data sheet: 1
  • Card Controller P6021y VB Evaluation Reference List, Version 2.7, 2021-05-04, NXP Semiconductors (confidential document) [19] NXP Secure Smart Card Controller P6021y VB Configuration List, Version 1.5, 2019-08-09, NXP: 1
  • confidential document) [20] Site Technical Audit Report (STAR), Taiwan Semiconductor Manufacturing Company Ltd, Taichung: 1
pdf_data/report_keywords/cipher_mode/CBC/CBC 10 1
pdf_data/report_keywords/cipher_mode/ECB/ECB 3 5
pdf_data/report_keywords/crypto_engine/SmartMX/SmartMX2 5 8
pdf_data/report_keywords/crypto_scheme
  • KA:
    • Key Agreement: 2
  • MAC:
    • MAC: 1
pdf_data/report_keywords/eval_facility/TUV/TÜV Informationstechnik 4 5
pdf_data/report_keywords/randomness/RNG/RNG 3 4
pdf_data/report_keywords/randomness/TRNG/TRNG 1 2
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 1
    • SPA: 1
    • DPA: 1
  • other:
    • JIL: 3
  • FI:
    • physical tampering: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/side_channel_analysis/other/JIL 3 4
pdf_data/report_keywords/standard_id
  • NIST:
    • NIST SP 800-67: 3
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 37: 2
    • AIS 31: 2
    • AIS 36: 1
    • AIS31: 1
    • AIS 35: 2
    • AIS 26: 1
    • AIS 32: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 14443: 6
    • ISO/IEC 7816: 2
  • FIPS:
    • FIPS197: 3
  • BSI:
    • AIS 34: 2
    • AIS 25: 2
    • AIS 37: 1
    • AIS 31: 3
    • AIS 36: 2
    • AIS31: 2
    • AIS 35: 2
    • AIS 1: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 38: 1
    • AIS 39: 1
    • AIS 46: 1
    • AIS 47: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 18045: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 2
pdf_data/report_keywords/standard_id/BSI
  • AIS 34: 2
  • AIS 25: 2
  • AIS 37: 2
  • AIS 31: 2
  • AIS 36: 1
  • AIS31: 1
  • AIS 35: 2
  • AIS 26: 1
  • AIS 32: 1
  • AIS 34: 2
  • AIS 25: 2
  • AIS 37: 1
  • AIS 31: 3
  • AIS 36: 2
  • AIS31: 2
  • AIS 35: 2
  • AIS 1: 1
  • AIS 26: 1
  • AIS 32: 1
  • AIS 38: 1
  • AIS 39: 1
  • AIS 46: 1
  • AIS 47: 1
pdf_data/report_keywords/standard_id/BSI/AIS 31 2 3
pdf_data/report_keywords/standard_id/BSI/AIS 36 1 2
pdf_data/report_keywords/standard_id/BSI/AIS 37 2 1
pdf_data/report_keywords/standard_id/BSI/AIS31 1 2
pdf_data/report_keywords/standard_id/ISO/ISO/IEC 14443 6 4
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES 17 9
pdf_data/report_keywords/symmetric_crypto/DES/3DES
  • TDES: 2
  • Triple-DES: 6
  • TDES: 1
  • Triple-DES: 4
  • TDEA: 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/TDES 2 1
pdf_data/report_keywords/symmetric_crypto/DES/3DES/Triple-DES 6 4
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES 5 3
pdf_data/report_keywords/symmetric_crypto/constructions/MAC
  • CMAC: 4
  • CBC-MAC: 1
pdf_data/report_keywords/vendor/NXP/NXP 21 29
pdf_data/report_keywords/vendor/NXP/NXP Semiconductors 35 28
pdf_data/report_metadata//CreationDate D:20161019121338+02'00' D:20210629095126+02'00'
pdf_data/report_metadata//Keywords "Common Criteria, Certification, Zertifizierung, Smartcard, NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software, NXP Semiconductors Germany GmbH" "Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6021y VB*including IC Dedicated Software, NXP Semiconductors Germany GmbH"
pdf_data/report_metadata//ModDate D:20161020141130+02'00' D:20210629101602+02'00'
pdf_data/report_metadata//Producer LibreOffice 4.2 LibreOffice 6.3
pdf_data/report_metadata//Subject Common Criteria Certification BSI-DSZ-CC-1072-V4-2021, NXP Secure Smart Card Controller P6021y VB*including IC Dedicated Software, Common Criteria
pdf_data/report_metadata//Title Certification Report BSI-DSZ-CC-0973-V2-2016 Certification Report BSI-DSZ-CC-1072-V4-2021
pdf_data/report_metadata/pdf_file_size_bytes 1339836 760867
pdf_data/report_metadata/pdf_number_of_pages 44 30
pdf_data/st_filename 0973V2b_pdf.pdf 1072V4b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 3 2
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1072: 1
pdf_data/st_keywords/cc_claims/O
  • O.RND: 3
  • O.TDES: 6
  • O.AES: 6
  • O.CUST_RECONF_PLAIN: 6
  • O.EEPROM_INTEGRITY: 5
  • O.FM_FW: 9
  • O.MEM_ACCESS: 10
  • O.SFR_ACCESS: 9
  • O.PUF: 6
  • O.CUST_RECONF_MIFARE: 6
  • O.ACCESS-CONTROL: 8
  • O.AUTHENTICATION: 7
  • O.ENCRYPTION: 6
  • O.MAC: 6
  • O.TYPE-CONSISTENCY: 4
  • O.DF-TRANSACTION: 4
  • O.TYPE-: 2
  • O.ACCESS-: 1
  • O.DF-: 2
  • O.RND: 3
  • O.TDES: 7
  • O.AES: 7
  • O.CUST_RECONF_PLAIN: 6
  • O.EEPROM_INTEGRITY: 5
  • O.FM_FW: 9
  • O.MEM_ACCESS: 10
  • O.SFR_ACCESS: 8
  • O.PUF: 6
  • O.SFR_: 1
pdf_data/st_keywords/cc_claims/O/O.AES 6 7
pdf_data/st_keywords/cc_claims/O/O.SFR_ACCESS 9 8
pdf_data/st_keywords/cc_claims/O/O.TDES 6 7
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 2
  • ADV_FSP.5: 22
  • ADV_IMP.2: 4
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 1
  • ADV_ARC: 2
  • ADV_FSP: 8
  • ADV_IMP: 2
  • ADV_FSP.4: 6
  • ADV_SPM: 2
  • ADV_IMP.1: 1
  • ADV_INT.2: 1
  • ADV_TDS.4: 1
  • ADV_ARC.1: 1
  • ADV_FSP.5: 11
  • ADV_IMP.2: 3
  • ADV_INT.3: 1
  • ADV_TDS.5: 1
  • ADV_SPM.1: 1
  • ADV_ARC: 1
  • ADV_FSP: 3
  • ADV_IMP: 1
  • ADV_FSP.4: 3
  • ADV_SPM: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP 8 3
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.4 6 3
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.5 22 11
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP 2 1
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.2 4 3
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE 2 1
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 2 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 6
  • ALC_DVS.2: 5
  • ALC_CMC.5: 4
  • ALC_CMS.5: 10
  • ALC_DEL.1: 2
  • ALC_LCD.1: 2
  • ALC_TAT.3: 1
  • ALC_DEL: 2
  • ALC_DVS: 2
  • ALC_CMS: 8
  • ALC_CMC: 5
  • ALC_CMS.4: 6
  • ALC_CMC.4: 4
  • ALC_TAT.2: 1
  • ALC_FLR.1: 6
  • ALC_CMC.5: 4
  • ALC_CMS.5: 5
  • ALC_DEL.1: 1
  • ALC_DVS.2: 1
  • ALC_LCD.1: 1
  • ALC_TAT.3: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_CMS: 3
  • ALC_CMC: 3
  • ALC_CMS.4: 3
  • ALC_CMC.4: 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC 5 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC.4 4 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS 8 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.4 6 3
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS.5 10 5
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS 2 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 5 1
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 2 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_TSS.2: 10
  • ASE_CCL.1: 2
  • ASE_ECD.1: 2
  • ASE_INT.1: 2
  • ASE_OBJ.2: 2
  • ASE_REQ.2: 2
  • ASE_SPD.1: 2
  • ASE_TSS: 2
  • ASE_TSS.2: 6
  • ASE_CCL.1: 1
  • ASE_ECD.1: 1
  • ASE_INT.1: 1
  • ASE_OBJ.2: 1
  • ASE_REQ.2: 1
  • ASE_SPD.1: 1
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 2 1
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.2 10 6
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.3: 4
  • ATE_DPT.3: 2
  • ATE_FUN.2: 1
  • ATE_IND.2: 2
  • ATE_COV: 2
  • ATE_COV.2: 1
  • ATE_FUN.1: 1
  • ATE_COV.3: 3
  • ATE_DPT.3: 1
  • ATE_FUN.2: 1
  • ATE_IND.2: 1
  • ATE_COV: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV 2 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.3 4 3
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 2 1
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 2 1
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN 2 1
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 7 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL6: 42
  • EAL5: 38
  • EAL6+: 13
  • EAL5+: 18
  • EAL4: 1
  • EAL4+: 3
  • EAL6 augmented: 4
  • EAL5 augmented: 2
  • EAL4 augmented: 1
  • EAL6: 44
  • EAL6+: 11
  • EAL4: 1
  • EAL4+: 2
  • EAL6 augmented: 5
  • EAL4 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL4+ 3 2
pdf_data/st_keywords/cc_security_level/EAL/EAL6 42 44
pdf_data/st_keywords/cc_security_level/EAL/EAL6 augmented 4 5
pdf_data/st_keywords/cc_security_level/EAL/EAL6+ 13 11
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 35 17
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 64 46
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 5 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 88 45
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 7 4
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_SDC.1: 16
  • FDP_SDI.2: 36
  • FDP_ITT.1: 6
  • FDP_IFC.1: 20
  • FDP_SDI.1: 5
  • FDP_SDI.2.1: 5
  • FDP_SDI.2.2: 5
  • FDP_SDC.1.1: 2
  • FDP_ITC.1: 24
  • FDP_ITC.2: 44
  • FDP_ACC.1: 74
  • FDP_ACC.1.1: 4
  • FDP_ACF.1: 56
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_ITC.2.1: 2
  • FDP_ITC.2.2: 2
  • FDP_ITC.2.3: 2
  • FDP_ITC.2.4: 2
  • FDP_ITC.2.5: 2
  • FDP_ROL.1: 7
  • FDP_ROL.1.1: 1
  • FDP_ROL.1.2: 1
  • FDP_SDC.1: 16
  • FDP_SDI.2: 36
  • FDP_ITT.1: 6
  • FDP_IFC.1: 10
  • FDP_SDI.1: 5
  • FDP_SDI.2.1: 5
  • FDP_SDI.2.2: 5
  • FDP_SDC.1.1: 2
  • FDP_ITC.1: 14
  • FDP_ITC.2: 16
  • FDP_ACC.1: 37
  • FDP_ACC.1.1: 2
  • FDP_ACF.1: 34
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 2
  • FDP_ACF.1.4: 2
  • FDP_ROL.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 74 37
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 56 34
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 4 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 20 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 24 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 44 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL.1 7 1
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.1: 10
  • FIA_UID.2: 17
  • FIA_UAU.2: 15
  • FIA_UAU.1: 2
  • FIA_UAU.5: 12
  • FIA_UAU.5.1: 2
  • FIA_UAU.5.2: 2
  • FIA_UAU.4: 1
  • FIA_UID.2: 2
  • FIA_UAU.2: 2
  • FIA_UAU.5: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 15 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 12 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 17 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM.1: 3
  • FMT_LIM.2: 4
  • FMT_MSA.3: 46
  • FMT_MSA.3.1: 4
  • FMT_MSA.3.2: 4
  • FMT_MSA.1: 51
  • FMT_SMR.1: 32
  • FMT_MSA.1.1: 4
  • FMT_SMF.1: 43
  • FMT_SMF.1.1: 3
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
  • FMT_LIM.1: 3
  • FMT_LIM.2: 4
  • FMT_MSA.3: 24
  • FMT_MSA.3.1: 2
  • FMT_MSA.3.2: 2
  • FMT_MSA.1: 28
  • FMT_MSA.1.1: 2
  • FMT_SMR.1: 7
  • FMT_SMF.1: 22
  • FMT_SMF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 51 28
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 4 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 46 24
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 4 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 4 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 43 22
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 3 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 32 7
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 8
  • FPT_PHP.3: 8
  • FPT_ITT.1: 6
  • FPT_TDC.1: 19
  • FPT_TDC.1.1: 2
  • FPT_TDC.1.2: 2
  • FPT_RPL.1: 16
  • FPT_RPL.1.1: 2
  • FPT_RPL.1.2: 2
  • FPT_FLS.1: 8
  • FPT_PHP.3: 8
  • FPT_ITT.1: 6
  • FPT_TDC.1: 2
  • FPT_RPL.1: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 16 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_TDC.1 19 2
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC.1: 4
  • FTP_TRP.1: 26
  • FTP_TRP.1.1: 2
  • FTP_TRP.1.2: 2
  • FTP_TRP.1.3: 7
  • FTP_ROL.1: 1
  • FTP_TRP.1: 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 26 2
pdf_data/st_keywords/cipher_mode/CBC/CBC 13 4
pdf_data/st_keywords/crypto_engine/SmartMX/SmartMX2 13 10
pdf_data/st_keywords/crypto_scheme/MAC/MAC 23 8
pdf_data/st_keywords/randomness/RNG/RNG 16 14
pdf_data/st_keywords/standard_id/BSI
  • AIS20: 2
  • AIS31: 4
  • AIS31: 2
pdf_data/st_keywords/standard_id/BSI/AIS31 4 2
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
pdf_data/st_keywords/standard_id/FIPS/FIPS 197 5 3
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 3 2
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 14443 24 20
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 7816 28 24
pdf_data/st_keywords/standard_id/NIST
  • NIST SP 800-67: 6
  • NIST SP 800-38A: 6
  • NIST SP 800-38B: 2
  • NIST SP 800-67: 4
  • NIST SP 800-38A: 3
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-38A 6 3
pdf_data/st_keywords/standard_id/NIST/NIST SP 800-67 6 4
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 122 82
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 51 45
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES 30 19
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 6 8
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • CBC-MAC: 2
  • CMAC: 9
  • CBC-MAC: 2
pdf_data/st_keywords/vendor/NXP/NXP 180 204
pdf_data/st_keywords/vendor/NXP/NXP Semiconductors 50 35
pdf_data/st_keywords/vendor/NXP/NXP Semiconductors N.V 130 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 854200
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 130
  • /Author: NXP Semiconductors
  • /CreationDate: D:20160816135914+02'00'
  • /Creator: DITA Open Toolkit
  • /Keywords: CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB
  • /ModDate: D:20160816135946+02'00'
  • /PDFVersion: 1.4
  • /Producer: Apache FOP Version 1.1
  • /Subject: NXP Secure Smart Card Controller P6022y VB
  • /Title: Security Target Lite
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 727760
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 97
  • /Title: Security Target Lite
  • /Author: NXP B.V.
  • /Subject: NXP Secure Smart Card Controller P6021y VB
  • /Keywords: CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6021y VB, P6021P VB, P6021M VB, P6021D VB, P6021J VB
  • /Creator: DITA Open Toolkit
  • /Producer: Apache FOP Version 1.1
  • /CreationDate: D:20190823113338+01'00'
  • pdf_hyperlinks:
pdf_data/st_metadata//Author NXP Semiconductors NXP B.V.
pdf_data/st_metadata//CreationDate D:20160816135914+02'00' D:20190823113338+01'00'
pdf_data/st_metadata//Keywords CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6021y VB, P6021P VB, P6021M VB, P6021D VB, P6021J VB
pdf_data/st_metadata//Subject NXP Secure Smart Card Controller P6022y VB NXP Secure Smart Card Controller P6021y VB
pdf_data/st_metadata/pdf_file_size_bytes 854200 727760
pdf_data/st_metadata/pdf_number_of_pages 130 97
dgst cdffae2b624bf6c7 702af8b4d4c75c1d