Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
THD89 1.0.3 Secure Element version 1.0
2021-36-INF-4157
NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
BSI-DSZ-CC-0555-2009
name THD89 1.0.3 Secure Element version 1.0 NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
scheme ES DE
status active archived
not_valid_after 26.09.2028 01.09.2019
not_valid_before 26.09.2023 10.11.2009
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36_Certificado.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20INF-4157.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0555a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-36%20ST_lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0555b_pdf.pdf
manufacturer Tongxin Microelectronics Co., Ltd. NXP Semiconductors
manufacturer_web https://www.tsinghuaic.com/english/article/article.asp?id=483248&bid=8610# https://www.nxp.com/
security_level EAL5+, AVA_VAN.5, ALC_DVS.2 EAL5+
dgst f030b4c2adc03fa7 1f3ad7a74ca0a6bd
heuristics/cert_id 2021-36-INF-4157 BSI-DSZ-CC-0555-2009
heuristics/cert_lab [] BSI
heuristics/direct_transitive_cves {} CVE-2021-3011
heuristics/indirect_transitive_cves {} CVE-2021-3011
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, ASE_TSS.2, APE_REQ.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ADV_FSP.5, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, ALC_TAT.2
heuristics/extracted_versions 1.0, 1.0.3 -
heuristics/report_references/directly_referenced_by NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR ANSSI-CC-2012/67, BSI-DSZ-CC-0748-2011, ANSSI-CC-2011/76, 2011-13-INF-1092, ANSSI-CC-2014/01, BSI-DSZ-CC-0675-2011, ANSSI-CC-2011/27, ANSSI-CC-2014/02, BSI-DSZ-CC-0642-2011, 2011-14-INF-1095, BSI-DSZ-CC-0745-2012, ANSSI-CC-2011/28, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0633-2010, ANSSI-CC-2012/36, BSI-DSZ-CC-0804-2012, 2011-15-INF-1098, CRP272, ANSSI-CC-2013/70, BSI-DSZ-CC-0703-2011, ANSSI-CC-2011/73, ANSSI-CC-2014/03, ANSSI-CC-2012/28, ANSSI-CC-2013/08, BSI-DSZ-CC-0799-2012, ANSSI-CC-2012/76, BSI-DSZ-CC-0784-2013, ANSSI-CC-2011/05, BSI-DSZ-CC-0702-2011, ANSSI-CC-2012/24, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0746-2012, 2011-12-INF-1089, 2012-8-INF-1198, BSI-DSZ-CC-0857-2013, ANSSI-CC-2010/40, ANSSI-CC-2012/66, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0747-2011, ANSSI-CC-2013/31, 2012-9-INF-1200, ANSSI-CC-2012/30, ANSSI-CC-2012/80
heuristics/report_references/indirectly_referenced_by NSCIB-CC-2400034-01-CR, NSCIB-CC-2400175-01-CR ANSSI-CC-2012/67, BSI-DSZ-CC-0748-2011, 2012-9-INF-1200, ANSSI-CC-2011/76, 2011-13-INF-1092, ANSSI-CC-2016/69, ANSSI-CC-2014/01, ANSSI-CC-2012/71, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0867-2014, ANSSI-CC-2011/27, ANSSI-CC-2014/02, ANSSI-CC-2011/64, BSI-DSZ-CC-0642-2011, 2011-14-INF-1095, ANSSI-CC-2012/10, BSI-DSZ-CC-0633-V2-2014, ANSSI-CC-2010/58, BSI-DSZ-CC-0745-2012, NSCIB-CC-15-67351-CR, ANSSI-CC-2011/28, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0744-2011, BSI-DSZ-CC-0866-V2-2014, BSI-DSZ-CC-0860-2013, BSI-DSZ-CC-0750-2011, BSI-DSZ-CC-0633-2010, ANSSI-CC-2012/36, BSI-DSZ-CC-0804-2012, 2011-15-INF-1098, CRP272, ANSSI-CC-2013/70, BSI-DSZ-CC-0703-2011, NSCIB-CC-13-37761-CR2, ANSSI-CC-2011/73, ANSSI-CC-2014/03, ANSSI-CC-2012/28, ANSSI-CC-2013/08, BSI-DSZ-CC-0799-2012, ANSSI-CC-2012/76, BSI-DSZ-CC-0784-2013, BSI-DSZ-CC-0741-2011, ANSSI-CC-2011/05, BSI-DSZ-CC-0702-2011, ANSSI-CC-2012/24, BSI-DSZ-CC-0821-2014, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0825-2017, 2011-12-INF-1089, 2012-8-INF-1198, BSI-DSZ-CC-0783-2013, BSI-DSZ-CC-0857-2013, ANSSI-CC-2010/40, Certificate Number: 2012/80, BSI-DSZ-CC-0866-2013, ANSSI-CC-2012/66, BSI-DSZ-CC-0857-V2-2015, ANSSI-CC-2019/38, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0743-2011, ANSSI-CC-2013/31, BSI-DSZ-CC-0864-2012, BSI-DSZ-CC-0742-2011, ANSSI-CC-2012/30, ANSSI-CC-2012/80
heuristics/scheme_data
  • category: Smart Cards and similiar devices
  • certification_date: 26.09.2023
  • enhanced:
    • category: Smart Cards and similiar devices
    • cc_version: Common Criteria 3.1 release 5
    • cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1876
    • certification_date: 26.09.2023
    • description: Renovación de certificado (12/08/2025) The TOE consists of hardware and IC dedicated software. The hardware is based on a 32-bit secure CPU with ROM (Non-Volatile Read-Only Memory), NVM (Non-volatile Programmable Memory) and RAM (Volatile Memory). The hardware of the TOE also incorporates communication peripherals and cryptographic coprocessors for execution and acceleration of symmetric and asymmetric cryptographic algorithms. The IC dedicated software consists of boot code and 3 libraries of cryptographic services. Among all the possibilities offered by these software and hardware requirements, the configuration selected for the evaluation is the following: TYPE NAME VERSION PACKAGE Hardware THD89 1.0.3 Module Software Crypto Library 2.1.0 SW library in ROM Crypto SU Library 2.2.0 SW library in NVM CryptoECCSec Library 1.0.0 SW library in NVM Boot code 1.0 Boot code in ROM Header file 0.1 cryptolib.h The TOE TOE THD89 1.0.3 Secure Element version 1.0 has gone through a Certificate Renewal process according to certification procedure PO-005. This process consists in updating the analysis of the certified product’s resistance against updated state of the art attack methods and vulnerabilities. The resistance to attacks has been re-assessed in the course of the Certificate Renewal process, and therefore the date to be considered as an archived certificate is reset in the certificate product list of the certification body considering the date of the renewal of the certificate.
    • evaluation_facility: Applus Laboratories
    • level: EAL5 + ALC_DVS.2 + AVA_VAN.5
    • manufacturer: Tongxin Microelectronics Co., Ltd.
    • report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2316
    • status: Certified
    • target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1875
    • type: Product
  • manufacturer: Tongxin Microelectronics Co., Ltd.
  • product: THD89 1.0.3 Secure Element version 1.0
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/998-thd89-1-0-3-secure-element-version-1-0
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2012/67, BSI-DSZ-CC-0748-2011, ANSSI-CC-2011/76, ANSSI-CC-2014/01, BSI-DSZ-CC-0675-2011, ANSSI-CC-2011/27, ANSSI-CC-2014/02, BSI-DSZ-CC-0642-2011, BSI-DSZ-CC-0745-2012, ANSSI-CC-2011/28, BSI-DSZ-CC-0798-2012, ANSSI-CC-2012/36, BSI-DSZ-CC-0804-2012, ANSSI-CC-2013/70, ANSSI-CC-2013/30, ANSSI-CC-2011/73, ANSSI-CC-2014/03, ANSSI-CC-2012/28, ANSSI-CC-2013/08, BSI-DSZ-CC-0799-2012, ANSSI-CC-2012/76, BSI-DSZ-CC-0784-2013, ANSSI-CC-2011/05, ANSSI-CC-2012/24, ANSSI-CC-2013/29, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0746-2012, ANSSI-CC-2010/40, ANSSI-CC-2012/66, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0747-2011, ANSSI-CC-2013/31, ANSSI-CC-2012/30, ANSSI-CC-2012/80
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2012/67, BSI-DSZ-CC-0748-2011, ANSSI-CC-2011/76, 2011-13-INF-1092, ANSSI-CC-2016/69, ANSSI-CC-2014/01, ANSSI-CC-2012/71, BSI-DSZ-CC-0675-2011, ANSSI-CC-2011/27, ANSSI-CC-2014/02, BSI-DSZ-CC-0642-2011, 2011-14-INF-1095, ANSSI-CC-2010/58, BSI-DSZ-CC-0745-2012, ANSSI-CC-2011/28, BSI-DSZ-CC-0798-2012, ANSSI-CC-2012/36, BSI-DSZ-CC-0804-2012, 2011-15-INF-1098, CRP272, ANSSI-CC-2013/70, ANSSI-CC-2013/30, ANSSI-CC-2011/73, ANSSI-CC-2014/03, ANSSI-CC-2012/28, ANSSI-CC-2013/08, BSI-DSZ-CC-0799-2012, ANSSI-CC-2012/76, BSI-DSZ-CC-0784-2013, ANSSI-CC-2011/05, ANSSI-CC-2012/24, ANSSI-CC-2013/29, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0746-2012, 2011-12-INF-1089, ANSSI-CC-2010/40, ANSSI-CC-2012/66, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0747-2011, ANSSI-CC-2013/31, ANSSI-CC-2012/30, ANSSI-CC-2012/80
heuristics/protection_profiles cf0f01bcd7be3e9c {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf {}
pdf_data/cert_filename 2021-36_Certificado.pdf
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
  • O:
    • O.E: 1
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20230904141829+02'00'
  • /ModDate: D:20230904141829+02'00'
  • /Producer: GPL Ghostscript 9.27
  • pdf_file_size_bytes: 887800
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename 2021-36 INF-4157.pdf 0555a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0555-2009
    • cert_item: NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH Business Line Identification
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-S-0201-2022: 1
  • ES:
    • 2021-36-INF-4157- v1: 1
  • DE:
    • BSI-DSZ-CC-0555: 1
    • BSI-DSZ-CC-0555-2009: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 2
  • BSI:
    • BSI-CC-PP-0035: 1
    • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 1
    • EAL5: 8
  • ITSEC:
    • ITSEC Evaluation: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL 7: 1
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_IMP.1: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 8
    • ALC_FLR: 3
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_VAN.5: 9
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 2
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 2
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 1
  • FCS:
    • FCS_COP.1: 4
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ITT.1: 1
    • FDP_SDC.1: 1
  • FMT:
    • FMT_LIM.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
  • FRU:
    • FRU_FLT.2: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 1
  • R:
    • R.O: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 19
    • NXP Semiconductors: 12
  • Philips:
    • Philips: 1
pdf_data/report_keywords/eval_facility
  • Applus:
    • Applus Laboratories: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDES: 3
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • Triple-DES: 6
    • DES:
      • DES: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDSA:
      • ECDSA: 1
  • RSA:
    • RSA-CRT: 4
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 1
  • RNG:
    • RNG: 4
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 2
pdf_data/report_keywords/ecc_curve
  • Brainpool:
    • brainpoolP224r1: 1
    • brainpoolP256r1: 1
    • brainpoolP512r1: 1
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library 2.1.0: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • JIL: 1
  • FI:
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 7816: 4
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 5639: 1
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 3
    • AIS 36: 3
    • AIS 38: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Secure Smart Card Controller, Version 1.0, 30.09.2009, BSI-DSZ-CC-0555, T-Systems GEI GmbH (confidential document) [12] Data Sheet, P5CD016/021/041 and P5Cx081, Secure dual interface and contact PKI Smart Card: 1
    • T-Systems Gei GmbH (confidential document) [8] Configuration List for the P5CD016/021/041 and P5Cx081 family, Rev. 1.0, NXP Semiconductors: 1
    • and P5Cx081V1A NXP Secure Smart Card, NXP Semiconductors, Business Line Identification (confidential document) [7] Evaluation Technical Report, V. 1.2, 3th November 2009, NXP P5CD081V1A Secure Smart Card: 1
pdf_data/report_metadata
  • /Author: 9308
  • /CreationDate: D:20230925160654+02'00'
  • /Creator: Microsoft® Word LTSC
  • /ModDate: D:20230925160654+02'00'
  • /Producer: Microsoft® Word LTSC
  • pdf_file_size_bytes: 418348
  • pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20091123125521+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software, NXP Semiconductors Germany GmbH"
  • /ModDate: D:20091207095523+01'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0555-2009
  • pdf_file_size_bytes: 795041
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename 2021-36 ST_lite.pdf 0555b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0555: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
  • BSI:
    • BSI-PP- 0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL5: 4
    • EAL5 augmented: 2
    • EAL5+: 4
  • EAL:
    • EAL 5: 3
    • EAL 5 augmented: 1
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL5: 32
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 3
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 6
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.4: 3
    • ADV_FSP.5: 11
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 4
    • ALC_CMS.4: 3
    • ALC_CMS.5: 5
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 9
    • FCS_CKM.4: 9
    • FCS_COP.1: 34
    • FCS_COP.1.1: 4
    • FCS_RNG.1: 7
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_IFC.1: 5
    • FDP_ITC.1: 9
    • FDP_ITC.2: 9
    • FDP_ITT.1: 7
    • FDP_SDC.1: 6
    • FDP_SDC.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FMT:
    • FMT_LIM.1: 4
    • FMT_LIM.2: 4
  • FPT:
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 7
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.2: 8
  • FAU:
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.4: 3
    • FCS_COP.1: 22
    • FCS_COP.1.1: 2
    • FCS_RNG.1: 4
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 33
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 30
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 10
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_ITT.1: 6
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MSA.1: 25
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 18
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
  • FPT:
    • FPT_FLS.1: 7
    • FPT_ITT.1: 6
    • FPT_PHP.3: 7
  • FRU:
    • FRU_FLT.2: 7
pdf_data/st_keywords/cc_claims
  • O:
    • O.AES: 7
    • O.ECC: 6
    • O.RND: 3
    • O.RSA: 7
    • O.TDES: 8
  • T:
    • T.RND: 2
  • O:
    • O.HW_AES: 7
    • O.MEM_ACCESS: 9
    • O.MF_FW: 7
    • O.RND: 3
    • O.SFR_ACCESS: 7
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 82
    • NXP Semiconductors: 19
  • Philips:
    • Philips: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 32
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 29
      • Triple-DES: 3
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 34
  • DES:
    • 3DES:
      • TDEA: 3
      • Triple-DEA: 1
      • Triple-DES: 9
    • DES:
      • DEA: 2
      • DES: 26
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 33
    • ECDSA:
      • ECDSA: 1
  • RSA:
    • RSA-CRT: 19
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • PKE:
    • PKE: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 6
  • TRNG:
    • TRNG: 3
  • RNG:
    • RND: 5
    • RNG: 8
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 8
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP224r1: 3
    • brainpoolP256r1: 1
    • brainpoolP320r1: 3
    • brainpoolP384r1: 1
    • brainpoolP512r1: 1
pdf_data/st_keywords/crypto_library
  • Generic:
    • Crypto Library 2.1.0: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 7
    • malfunction: 3
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 5
    • Physical Probing: 2
    • physical probing: 4
    • side channel: 1
  • FI:
    • Malfunction: 10
    • fault injection: 5
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 13
    • Physical Probing: 2
    • physical probing: 1
    • timing attacks: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS26: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 7816: 6
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-67: 1
  • RFC:
    • RFC 5639: 2
  • FIPS:
    • FIPS PUB 197: 3
    • FIPS PUB 46: 1
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 14443: 16
    • ISO/IEC 18092: 2
    • ISO/IEC 7816: 10
pdf_data/st_metadata
  • /CreationDate: D:20230627103637+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20230627103637+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 780001
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /Author: Astrid Schweer
  • /CreationDate: 21.09.2009 14:55:13
  • /CreationDate--Text: 21.09.2009 14:55:13
  • /Creator: FreePDF XP 3.26 - http://shbox.de
  • /Keywords: Security Evaluation, Security Functional Requirements, Security Functions, Assurance Level
  • /ModDate: D:20091130182015+01'00'
  • /Producer: AFPL Ghostscript 7.04
  • /Subject: Common Criteria Evaluation
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 487711
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 67
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different