Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
McAfee Endpoint Encryption for PC v5.2.6 with McAfee Endpoint Encryption Manager v5.2.6
CCEVS-VR-VID-10400-2011
NXP Secure Smart Card Controller P6021y VA including IC Dedicated Software
BSI-DSZ-CC-0981-2016
name McAfee Endpoint Encryption for PC v5.2.6 with McAfee Endpoint Encryption Manager v5.2.6 NXP Secure Smart Card Controller P6021y VA including IC Dedicated Software
category Data Protection ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US DE
not_valid_after 01.11.2014 14.09.2021
not_valid_before 17.10.2011 15.07.2016
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10400-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0981a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10400-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0981b_pdf.pdf
manufacturer McAfee, Inc. NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.mcafee.com/ https://www.nxp.com
security_level EAL4+, ALC_FLR.3 ASE_TSS.2, EAL5+, ALC_DVS.2, AVA_VAN.5
dgst ee66687b54d71ea5 faffd854c6289b8d
heuristics/cert_id CCEVS-VR-VID-10400-2011 BSI-DSZ-CC-0981-2016
heuristics/cert_lab US BSI
heuristics/extracted_sars ALC_LCD.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.3, ALC_FLR.3, ATE_DPT.2, AGD_PRE.1, ATE_IND.2, ATE_FUN.1, AGD_OPE.1, ATE_COV.2, ALC_CMS.4, ALC_CMC.4, ADV_IMP.1, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1, ALC_DVS.1 ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, ASE_TSS.2, APE_REQ.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ADV_FSP.5, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, ALC_TAT.2
heuristics/extracted_versions 5.2.6 -
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10400/
  • categories: ['Sensitive Data Protection']
  • category: Sensitive Data Protection
  • certification_date: 04.10.2011
  • evaluation_facility: COACT, Inc. Labs
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10400
  • product: McAfee Endpoint Encryption for PC v5.2.6 with McAfee Endpoint Encryption Manager v5.2.6
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10400
  • vendor: McAfee, LLC
heuristics/protection_profiles {} cf0f01bcd7be3e9c
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/report_filename st_vid10400-vr.pdf 0981a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10400-2011
    • cert_item: McAfee Endpoint Encryption for PC version 5.2.6 with McAfee Endpoint Encryption Manager version 5.2.6
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ASE_TSS.2, ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0981-2016
    • cert_item: NXP Secure Smart Card Controller P6021y VA including IC Dedicated Software
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10400-2011: 1
  • DE:
    • BSI-DSZ-CC-0981: 2
    • BSI-DSZ-CC-0981-2016: 20
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 7
    • EAL 4 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL 1: 7
    • EAL 2: 7
    • EAL 3: 4
    • EAL 4: 6
    • EAL 5: 14
    • EAL 5 augmented: 3
    • EAL 5+: 1
    • EAL 6: 4
    • EAL 7: 4
    • EAL5: 1
    • EAL5 augmented: 1
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 3
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 8
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 3
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 2
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 7
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 7
  • R:
    • R.O: 7
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 7
  • NXP:
    • NXP: 21
    • NXP Semiconductors: 27
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
    • TÜViT: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • Triple-DES: 5
    • DES:
      • DES: 4
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 3
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 3
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 8
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 25: 2
    • AIS 26: 1
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 2
    • AIS 37: 1
    • AIS 38: 1
    • AIS31: 1
  • ISO:
    • ISO/IEC 14443: 6
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 7816: 2
  • NIST:
    • NIST SP 800-67: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Controller P6021y VA Security Target BSI-DSZ-CC-0981, Version 1.1, 2016-06-14, NXP Semiconductors (confidential document) [7] Evaluation Technical Report for the P6021y VA, Version 3, 2016-06-24, TÜV Informationstechnik: 1
    • Evaluation (ETR COMP) for the P6021y VA, Version 3, 2016-06-24, TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
pdf_data/report_metadata
pdf_data/st_filename st_vid10400-st.pdf 0981b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0981: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-2014: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 2
    • EAL4+: 4
  • EAL:
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL4+: 2
    • EAL5: 38
    • EAL5 augmented: 2
    • EAL5+: 12
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 14
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 4
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.4: 3
    • ADV_FSP.5: 11
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 4
    • ALC_CMS.4: 3
    • ALC_CMS.5: 5
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 4
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 22
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 13
    • FAU_GEN.2.1: 2
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 13
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
    • FAU_STG.3: 13
    • FAU_STG.3.1: 2
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 10
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 31
    • FCS_COP.1.1: 4
  • FDP:
    • FDP_ACC.2: 11
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 13
    • FIA_UAU.2.1: 2
    • FIA_UAU.4: 23
    • FIA_UAU.4.1: 2
    • FIA_UAU.7: 19
    • FIA_UAU.7.1: 2
    • FIA_UID.2: 13
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 2
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 28
    • FMT_MTD.1.1: 4
    • FMT_MTD.2: 6
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_REV.1: 13
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SAE.1: 13
    • FMT_SAE.1.1: 2
    • FMT_SAE.1.2: 2
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_RCV.1: 5
    • FPT_RCV.1.1: 1
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
  • FRU:
    • FRU_FLT.1: 5
    • FRU_FLT.1.1: 1
  • FTA:
    • FTA_SSL.2: 5
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 8
    • FCS_CKM.4: 27
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 30
    • FCS_COP.1.1: 2
    • FCS_RNG.1: 8
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 33
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 30
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 10
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_ITT.1: 6
    • FDP_SDC.1: 14
    • FDP_SDC.1.1: 2
    • FDP_SDI.1: 4
    • FDP_SDI.2: 26
    • FDP_SDI.2.1: 4
    • FDP_SDI.2.2: 4
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MSA.1: 25
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 20
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
  • FPT:
    • FPT_FLS.1: 7
    • FPT_ITT.1: 6
    • FPT_PHP.3: 7
  • FRU:
    • FRU_FLT.2: 7
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUTHENTICATION_DATA_PRIVATE: 5
    • A.AVAILABLE_BACKUP: 4
    • A.DOMAIN_SEPARATION: 4
    • A.MANAGEMENT: 5
    • A.NON_TECHNICAL_IDENTITY_VERIFICATION: 5
    • A.NO_MALEVOLENCE: 3
    • A.PROFICIENT_USERS: 6
    • A.SECURE_BACKUP: 4
    • A.TIME_SOURCE: 5
    • A.TRUSTED_SOFTWARE: 4
  • O:
    • O.ACCESS_CONTROL: 9
    • O.AUDIT: 14
    • O.AUTHORISATION: 18
    • O.AUTHORISED: 1
    • O.CRYPOTOGRAPHIC_KEYS: 3
    • O.CRYPTOGRAPHIC_KEYS: 8
    • O.CRYPTOGRAPHIC_OPERATIONS: 9
    • O.DATA_TRANSFER: 9
    • O.EASE_OF_USE_USER: 7
    • O.EFFECTIVE_ADMINISTRATION: 8
    • O.ENCRYPTED_MEDIA: 9
    • O.FAULT_TOLERANCE: 7
    • O.NO_OBJECT_REUSE: 9
    • O.PROTECT: 9
    • O.SECURE_RECOVERY: 7
    • O.TRUSTED_PATH: 9
    • O.UNATHORISED_MODIFICATION: 1
  • OE:
    • OE.AUTH: 6
    • OE.AVAILABLE_BACKUP: 6
    • OE.DOMAIN_SEPARATION: 4
    • OE.EASE_OF_USE_ADMIN: 8
    • OE.EASE_OF_USE_USER: 6
    • OE.MANAGED: 10
    • OE.NON_TECHNICAL_IDENTITY_VERIFICATION: 6
    • OE.SECURE_BACKUP: 6
    • OE.TIME_SOURCE: 9
    • OE.TRUSTED_SOFTWARE: 4
  • T:
    • T.ACCESS: 9
    • T.ALTERNATE_BOOT_PROCESS: 4
    • T.CONFIG: 3
    • T.CONFIG_MODIFICATION: 1
    • T.CORRUPT_AUDIT: 5
    • T.EASE_OF_USE_ADMIN: 4
    • T.EASE_OF_USE_USER: 4
    • T.EAVESDROP_TRANSIT: 4
    • T.OBJECT_REUSE: 5
    • T.PASSWORD_LOSS: 6
    • T.RECORD_ACTIONS: 7
    • T.RECOVERY_MASQUERADE: 5
    • T.RECOVERY_PROCEDURE_INTERCEPT: 3
    • T.REMOVE_DISK: 3
    • T.SPOOF: 5
    • T.SYSTEM_ACCESS: 9
    • T.UNAUTHORISED_MODIFICATION: 9
  • O:
    • O.AES: 6
    • O.EEPROM_INTEGRITY: 5
    • O.FM_FW: 9
    • O.MEM_ACCESS: 10
    • O.RND: 3
    • O.SFR_ACCESS: 9
    • O.TDES: 6
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 12
  • NXP:
    • NXP: 36
    • NXP Semiconductors: 30
    • NXP Semiconductors N.V: 69
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 31
      • AES-256: 1
  • AES_competition:
    • AES:
      • AES: 71
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 47
      • Triple-DES: 22
    • DES:
      • DEA: 1
      • DES: 6
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 9
    • DSA:
      • DSA: 19
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 13
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 3
  • RNG:
    • RNG: 1
  • RNG:
    • RND: 5
    • RNG: 13
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 8
  • ECB:
    • ECB: 6
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 1
    • SmartMX2: 10
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 10
    • fault injection: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 10
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 1
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 3
    • FIPS 186-2: 5
    • FIPS 197: 4
  • RFC:
    • RFC 2631: 2
    • RFC 2898: 3
  • BSI:
    • AIS31: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS 197: 1
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 14443: 20
    • ISO/IEC 18092: 2
    • ISO/IEC 7816: 16
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-67: 4
pdf_data/st_metadata
  • /Author: Alan Gornall
  • /CreationDate: D:20111028152413
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20111028152413
  • /Producer: Microsoft® Office Word 2007
  • /Title: 1
  • pdf_file_size_bytes: 736993
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 60
  • /Author: NXP Semiconductors
  • /CreationDate: D:20160615091953+02'00'
  • /Creator: DITA Open Toolkit
  • /Keywords: CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+, P6021y VA, P6021M VA
  • /ModDate: D:20160615092515+02'00'
  • /PDFVersion: 1.4
  • /Producer: Apache FOP Version 1.1
  • /Subject: NXP Secure Smart Card Controller P6021y VA
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 502647
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 69
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different