This page was not yet optimized for use on mobile devices.
NXP Secure Smart Card Controller P6021y VA including IC Dedicated Software
CSV information ?
Status | archived |
---|---|
Valid from | 15.07.2016 |
Valid until | 14.09.2021 |
Scheme | 🇩🇪 DE |
Manufacturer | NXP Semiconductors Germany GmbH Business Line Identification |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ALC_DVS.2, ASE_TSS.2, AVA_VAN.5, EAL5+ |
Heuristics summary ?
Certificate ID: BSI-DSZ-CC-0981-2016
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DESRandomness
TRNG, RNGEngines
SmartMX2Block cipher modes
ECBVendor
NXP, NXP SemiconductorsSecurity level
EAL 5, EAL 2, EAL 1, EAL 4, EAL5, EAL 5+, EAL 6, EAL 3, EAL 7, EAL 5 augmented, EAL5 augmented, ITSEC EvaluationClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_IMP.1, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.2, ADV_INT.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMS.5, ALC_TAT.2, ALC_CMC.4, ALC_LCD.1, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.2, ALC_TAT.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_DPT.3, ATE_COV.2, ATE_FUN, ATE_IND, ATE_COV.1, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, AVA_VAN.5, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_TSS.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-0981-2016, BSI-DSZ-CC-0981Evaluation facilities
TÃœV Informationstechnik, TÃœViTCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Controller P6021y VA Security Target BSI-DSZ-CC-0981, Version 1.1, 2016-06-14, NXP Semiconductors (confidential document) [7] Evaluation Technical Report for the P6021y VA, Version 3, 2016-06-24, TÜV Informationstechnik, confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, Evaluation (ETR COMP) for the P6021y VA, Version 3, 2016-06-24, TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JILSide-channel analysis
physical probing, SPA, DPA, JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Controller P6021y VA Security Target BSI-DSZ-CC-0981, Version 1.1, 2016-06-14, NXP Semiconductors (confidential document) [7] Evaluation Technical Report for the P6021y VA, Version 3, 2016-06-24, TÜV Informationstechnik, confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, Evaluation (ETR COMP) for the P6021y VA, Version 3, 2016-06-24, TÜV Informationstechnik GmbH (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JILStandards
NIST SP 800-67, AIS 34, AIS 25, AIS 37, AIS 31, AIS 36, AIS31, AIS 35, AIS 26, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 14443, ISO/IEC 7816Technical reports
BSI TR-02102, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0981-2016 |
---|---|
Subject | Common Criteria Certification |
Keywords | "Common Criteria, Certification, Zertifizierung, P6021yVA" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20160803103823+02'00' |
Modification date | D:20160805100422+02'00' |
Pages | 38 |
Creator | Writer |
Producer | LibreOffice 4.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-0981-2016 |
---|---|
Certified item | NXP Secure Smart Card Controller P6021y VA including IC Dedicated Software |
Certification lab | BSI |
Developer | NXP Semiconductors Germany GmbH |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDES, TDEAAsymmetric Algorithms
ECCRandomness
TRNG, RND, RNGEngines
SmartMX2, SmartMXBlock cipher modes
ECB, CBCVendor
NXP, NXP Semiconductors, NXP Semiconductors N.VSecurity level
EAL5, EAL5+, EAL4, EAL4+, EAL5 augmented, EAL4 augmentedClaims
O.RND, O.TDES, O.AES, O.EEPROM_INTEGRITY, O.FM_FW, O.MEM_ACCESS, O.SFR_ACCESS, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_ARC, ADV_FSP, ADV_IMP, ADV_FSP.4, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMS.4, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RNG.1, FCS_COP.1, FCS_CKM.4, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_COP.1.1, FCS_CKM.4.1, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDC.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2Protection profiles
BSI-PP-0084-2014Certificates
BSI-DSZ-CC-0981Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injectionStandards
FIPS 197, FIPS PUB 197, NIST SP 800-67, NIST SP 800-38A, AIS31, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 18092, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | Security Target Lite |
---|---|
Subject | NXP Secure Smart Card Controller P6021y VA |
Keywords | CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+, P6021y VA, P6021M VA |
Author | NXP Semiconductors |
Creation date | D:20160615091953+02'00' |
Modification date | D:20160615092515+02'00' |
Pages | 69 |
Creator | DITA Open Toolkit |
Producer | Apache FOP Version 1.1 |
Heuristics ?
Certificate ID: BSI-DSZ-CC-0981-2016
Extracted SARs
ASE_CCL.1, AGD_PRE.1, ATE_COV.2, ASE_REQ.2, APE_INT.1, ALC_FLR.3, ATE_IND.2, ASE_ECD.1, ASE_TSS.2, ALC_TAT.2, ASE_SPD.1, AVA_VAN.5, ALC_CMC.4, APE_ECD.1, ALC_DEL.1, APE_CCL.1, ALC_DVS.2, ADV_INT.2, ADV_SPM.1, ALC_LCD.1, ASE_INT.1, ATE_FUN.1, APE_SPD.1, ASE_OBJ.2, ADV_IMP.1, APE_OBJ.2, ADV_FSP.5, ATE_DPT.3, ALC_CMS.5, APE_REQ.2, ADV_TDS.4, ADV_ARC.1, AGD_OPE.1References ?
No references are available for this certificate.
Updates ?
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name NXP Secure Smart Card Controller P6021y VA including IC Dedicated Software was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "faffd854c6289b8d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0981-2016",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "NXP Semiconductors Germany GmbH Business Line Identification",
"manufacturer_web": "https://www.nxp.com",
"name": "NXP Secure Smart Card Controller P6021y VA including IC Dedicated Software",
"not_valid_after": "2021-09-14",
"not_valid_before": "2016-07-15",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0981a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ASE_TSS.2, ALC_DVS.2 and AVA_VAN.5 SOGIS Recognition Agreement",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0981-2016",
"cert_item": "NXP Secure Smart Card Controller P6021y VA including IC Dedicated Software",
"cert_lab": "BSI",
"developer": "NXP Semiconductors Germany GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0981": 2,
"BSI-DSZ-CC-0981-2016": 20
}
},
"cc_claims": {
"O": {
"O.C": 7
},
"R": {
"R.O": 7
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 2,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 2,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 3,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 8,
"ALC_FLR": 3,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 3,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 3,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 5
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 2,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 2,
"ATE_DPT.4": 1,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 2,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 3,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 7,
"EAL 2": 7,
"EAL 3": 4,
"EAL 4": 6,
"EAL 5": 14,
"EAL 5 augmented": 3,
"EAL 5+": 1,
"EAL 6": 4,
"EAL 7": 4,
"EAL5": 1,
"EAL5 augmented": 1
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Controller P6021y VA Security Target BSI-DSZ-CC-0981, Version 1.1, 2016-06-14, NXP Semiconductors (confidential document) [7] Evaluation Technical Report for the P6021y VA, Version 3, 2016-06-24, T\u00dcV Informationstechnik": 1,
"Evaluation (ETR COMP) for the P6021y VA, Version 3, 2016-06-24, T\u00dcV Informationstechnik GmbH (confidential document) 8 specifically \u2022 AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January": 1
}
},
"cipher_mode": {
"ECB": {
"ECB": 3
}
},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX2": 8
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 4,
"T\u00dcViT": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 3
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 1
},
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 1,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 2,
"AIS 37": 1,
"AIS 38": 1,
"AIS31": 1
},
"ISO": {
"ISO/IEC 14443": 6,
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 7816": 2
},
"NIST": {
"NIST SP 800-67": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"Triple-DES": 5
},
"DES": {
"DES": 4
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 21,
"NXP Semiconductors": 27
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20160803103823+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, P6021yVA\"",
"/ModDate": "D:20160805100422+02\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0981-2016",
"pdf_file_size_bytes": 820576,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.sogisportal.eu/",
"https://www.bsi.bund.de/AIS",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "0981b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0981": 1
}
},
"cc_claims": {
"O": {
"O.AES": 6,
"O.EEPROM_INTEGRITY": 5,
"O.FM_FW": 9,
"O.MEM_ACCESS": 10,
"O.RND": 3,
"O.SFR_ACCESS": 9,
"O.TDES": 6
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0084-2014": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 4,
"ADV_FSP.4": 3,
"ADV_FSP.5": 11,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 1,
"ALC_CMS": 4,
"ALC_CMS.4": 3,
"ALC_CMS.5": 5,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 4,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.2": 5
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL4 augmented": 1,
"EAL4+": 2,
"EAL5": 38,
"EAL5 augmented": 2,
"EAL5+": 12
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 6,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 8,
"FCS_CKM.4": 27,
"FCS_CKM.4.1": 2,
"FCS_COP.1": 30,
"FCS_COP.1.1": 2,
"FCS_RNG.1": 8,
"FCS_RNG.1.1": 3,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC.1": 33,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 30,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 10,
"FDP_ITC.1": 8,
"FDP_ITC.2": 8,
"FDP_ITT.1": 6,
"FDP_SDC.1": 14,
"FDP_SDC.1.1": 2,
"FDP_SDI.1": 4,
"FDP_SDI.2": 26,
"FDP_SDI.2.1": 4,
"FDP_SDI.2.2": 4
},
"FMT": {
"FMT_LIM.1": 3,
"FMT_LIM.2": 3,
"FMT_MSA.1": 25,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 20,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_SMF.1": 15,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7
},
"FPT": {
"FPT_FLS.1": 7,
"FPT_ITT.1": 6,
"FPT_PHP.3": 7
},
"FRU": {
"FRU_FLT.2": 7
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 8
},
"ECB": {
"ECB": 6
}
},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX": 1,
"SmartMX2": 10
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 13
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 10,
"fault injection": 2,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 10,
"Physical Probing": 2,
"physical probing": 1,
"side channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 2
},
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
},
"FIPS": {
"FIPS 197": 1,
"FIPS PUB 197": 2
},
"ISO": {
"ISO/IEC 14443": 20,
"ISO/IEC 18092": 2,
"ISO/IEC 7816": 16
},
"NIST": {
"NIST SP 800-38A": 2,
"NIST SP 800-67": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 71
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 47,
"Triple-DES": 22
},
"DES": {
"DEA": 1,
"DES": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 36,
"NXP Semiconductors": 30,
"NXP Semiconductors N.V": 69
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "NXP Semiconductors",
"/CreationDate": "D:20160615091953+02\u002700\u0027",
"/Creator": "DITA Open Toolkit",
"/Keywords": "CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+, P6021y VA, P6021M VA",
"/ModDate": "D:20160615092515+02\u002700\u0027",
"/PDFVersion": "1.4",
"/Producer": "Apache FOP Version 1.1",
"/Subject": "NXP Secure Smart Card Controller P6021y VA",
"/Title": "Security Target Lite",
"pdf_file_size_bytes": 502647,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 69
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf",
"pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/0981a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ALC_DVS.2",
"EAL5+",
"ASE_TSS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/0981b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "31d17bf4a651657173f14f1909fe7471e1b7a2ff4f7346579b480b5f13a0fa2c",
"txt_hash": "b577a90b8740a5f153a24db037c2ba2b695a8fed7f20332c059b2dcf526cd5b3"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "073d31eb51626c9dc96e883c0468653e978ab83b563e9c496b4bc37678277fdc",
"txt_hash": "adab56a7b34eeb45770971d65467682c37f5903f572468d032a86d535fb3aef0"
}
},
"status": "archived"
}