NXP Smart Card Controller P5CC052V0A with specific IC Dedicated Software

CSV information ?

Status archived
Valid from 24.06.2008
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer NXP Semiconductors
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VLA.4, AVA_MSU.3, EAL5+, ALC_DVS.2
Maintenance updates NXP Smart Card Controller P5CC052V0A with specific IC Dedicated Software (19.12.2013) Certification report
NXP Smart Card Controller P5CC052V0A/V0B with specific IC Dedicated Software (31.07.2012) Certification report Security target
NXP Smart Card Controller P5CC052V0A with specific IC Dedicated Software (08.09.2009) Certification report Security target

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0466-2008

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEA
Asymmetric Algorithms
ECDSA
Randomness
TRNG, RNG
Engines
SmartMX

Vendor
NXP Semiconductors, NXP, Infineon Technologies AG, Philips

Security level
EAL 5, EAL 4, EAL4, EAL 1, EAL 7, EAL5, EAL5+, EAL1, EAL3, EAL7, EAL2, EAL6, EAL 5 augmented, EAL5 augmented
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_LCD.2, ALC_TAT.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSS
Protection profiles
BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0466-2008, BSI-DSZ-CC-0466

Side-channel analysis
physical probing, DPA, SPA, physical tampering, JIL
Certification process
Card Controller, NXP Semiconductors, Business Line Identification, Version 1.3, April 16th, 2008 (confidential document) [7] Evaluation Technical Report, BSI-DSZ-CC-0466, Version 1.0, April 18th, 2008, NXP P5CC052V0A, Smart Card Controller, T-Systems (confidential document) [8] Configuration List for the NXP P5xC012/02x/037/052 family of Secure Smart Card Controllers, Version 1.2, NXP Semiconductors, April 16th, 2008 (confidential document) [9] Security Target Lite, Evaluation of the P5CC052V0A Secure Smart Card Controller, NXP, Secure Smart Card Controller, BSIDSZ-CC-0465, T-Systems GEI GmbH, Version 1.1, 16.04.2008 (confidential document) 8 specifically • AIS 25, Version 3, 6 August 2007, Anwendung der CC auf Integrierte Schaltungen

Standards
AIS 34, AIS 25, AIS 26, AIS 31, AIS 35, AIS 32, AIS 36, AIS 38, ISO/IEC 15408:2005
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title Zertifizierungsreport BSI-DSZ-CC-0466-2008
Subject Common Criteria Zertifizierung
Keywords "BSI-DSZ-CC-0466-2008, Smart Card Controller P5CC052V0A with specific IC Dedicated Software, NXP Semiconductors Germany GmbH"
Author Federal Office for Information Security
Creation date D:20080708134103+02'00'
Modification date D:20080708140300+02'00'
Pages 36
Creator Writer
Producer StarOffice 8

Frontpage

Certificate ID BSI-DSZ-CC-0466-2008
Certified item Smart Card Controller P5CC052V0A with specific IC Dedicated Software
Certification lab BSI
Developer NXP Semiconductors Germany GmbH

References

Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
DES, DEA, Triple-DES, TDEA, Triple-DEA
Asymmetric Algorithms
ECC
Randomness
TRNG, RND, RNG
Engines
SmartMX

Vendor
NXP, NXP Semiconductors, Philips

Security level
EAL5, EAL 5, EAL4, EAL5+, EAL4+, EAL5 augmented, EAL 5 augmented, EAL4 augmented
Claims
O.RND, O.MF_FW, O.MEM_ACCESS, O.SFR_ACCESS, O.CONFIG, T.RND
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ACM_SCP.2, ACM_SCP, ACM_AUT, ACM_CAP, ADO_DEL.2, ADO_IGS.1, ADO_IGS, ADO_DEL, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, ADV_FSP.2, ADV_FSP, ADV_RCR, ADV_SPM, ADV_HLD, ADV_LLD, ADV_INT, ADV_IMP, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_VLA.4, AVA_CCA.1, AVA_SOF.1, AVA_MSU
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RND.1, FCS_RND.1.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FCS_CKM, FDP_IFC.1, FDP_ITT.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC, FDP_SDI.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_AMT.1, FRU_FLT.2
Protection profiles
BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-0466

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injection

Standards
FIPS PUB 46-3, FIPS PUB 46, AIS31, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003

File metadata

Title Security Target Lite P5CC052V0A
Subject P5CC052V0A Common Criteria Evaluation
Keywords Security IC (Smart Card) evaluation; Assurance Level EAL5+ (AVA_VLA.4); BSI-PP-0002-2001 compliant; P5CC052V0A Security Requirements, Security Objectives and Security Functions
Author NXP SEmiconductore (Hans-Gerd Albertsen)
Creation date D:20080416152002Z
Modification date D:20080708140426+02'00'
Pages 68
Producer AFPL Ghostscript 8.14

References

Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-0466-2008

Extracted SARs

ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_CCA.1, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4

Similar certificates

Name Certificate ID
NXP Secure Smart Card Controller P5CT072V0N, P5CD072V0N, P5CD036V0N, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software BSI-DSZ-CC-0375-2007 Compare
NXP Smart Card Controller P5CC037V0A with specific IC Dedicated Software BSI-DSZ-CC-0465-2008 Compare
NXP Smart Card Controller P5CC036V1D and P5CC009V1D each with specific IC dedicated Software BSI-DSZ-CC-0583-2009 Compare
NXP Secure Smart Card Controller P5CD144V0B, P5CN144V0B and P5CC144V0B each with specific IC Dedicated Software BSI-DSZ-CC-0411-2007 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software BSI-DSZ-CC-0410-2007 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CC080V0B, P5CN080V0B, P5CC073V0B each with specific IC Dedicated Software BSI-DSZ-CC-0700-2011 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B and P5CC073V0B each with specific IC Dedicated Software BSI-DSZ-CC-0680-2010 Compare
NXP Secure Smart Card Controller P5CD040V0B, P5CC040V0B, P5CD020V0B and P5CC021V0B each with specific IC Dedicated Software BSI-DSZ-CC-0404-2007 Compare
NXP Smart Card Controller P5CC052V0A with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0551-2008 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software BSI-DSZ-CC-0827-V8-2020 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Toolbox, Base, FTL, SCL, HCL, and PSL, and with specific IC dedicated software BSI-DSZ-CC-0827-V7-2018 Compare
Infineon smart card IC (Security Controller) M9900 A21 with specific IC dedicated software BSI-DSZ-CC-0791-2012 Compare
Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software BSI-DSZ-CC-0827-V4-2016 Compare
Infineon Smart Card IC (Security Controller), SLE66CL80P / m1457a14 and SLE66CL81P / m1436a14 with specific IC Dedicated Software BSI-DSZ-CC-0401-2006 Compare
Infineon Smart Card IC (Security Controller) SLE66CL80P/m1457-a14 and SLE66CL81P/m1436-a14 with specific IC Dedicated Software BSI-DSZ-CC-0354-2006 Compare
Infineon Smart Card IC (Security Controller) SLE66CX642P/m1485b16 with RSA 2048 V1.30 and specific IC Dedicated Software BSI-DSZ-CC-0315-2005 Compare
Infineon Smart Card IC (Security Controller) SLE66CX322P/m1484b14 and m1484f18 with RSA 2048 V1.30 and specific IC Dedicated Software BSI-DSZ-CC-0266-2005 Compare
Infineon Smart Card IC (Security Controller) SLE66CLX320P / m1559b19 and SLE66CLX321P / m1359b19 both with RSA2048 V1.3 and specific IC Dedicated Software BSI-DSZ-CC-0337-2005 Compare
Philips Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q,P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software BSI-DSZ-CC-0349-2006 Compare
Showing 5 out of 19.

References ?

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5f7707d6431f328cd866e4d25a7d21000626edfb74f964a8a26b7f54552b181f', 'txt_hash': '8f9af258ab012cd09c9c9b6ecef3f4a6c298efb0e55aa77d48907ea9be0105ef'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '361f2c1615445eeb440b6be5bdf901f57d7090513864c5a5c058598dc85f6a13', 'txt_hash': '4f453bafae15693fbdc7d33cbd4b88172892ef40c1d200935c6fdbba1cc5c633'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 560116, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 36, '/CreationDate': "D:20080708134103+02'00'", '/Subject': 'Common Criteria Zertifizierung', '/Author': 'Federal Office for Information Security', '/Creator': 'Writer', '/Keywords': '"BSI-DSZ-CC-0466-2008, Smart Card Controller P5CC052V0A with specific IC Dedicated Software, NXP Semiconductors Germany GmbH"', '/Producer': 'StarOffice 8', '/ModDate': "D:20080708140300+02'00'", '/Title': 'Zertifizierungsreport BSI-DSZ-CC-0466-2008', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.bsi.bund.de/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 634160, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 68, '/CreationDate': 'D:20080416152002Z', '/Subject': 'P5CC052V0A Common Criteria Evaluation', '/Author': 'NXP SEmiconductore (Hans-Gerd Albertsen)', '/Keywords': 'Security IC (Smart Card) evaluation; Assurance Level EAL5+ (AVA_VLA.4); BSI-PP-0002-2001 compliant; P5CC052V0A Security Requirements, Security Objectives and Security Functions', '/Producer': 'AFPL Ghostscript 8.14', '/ModDate': "D:20080708140426+02'00'", '/Title': 'Security Target Lite P5CC052V0A', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0466-2008', 'cert_item': 'Smart Card Controller P5CC052V0A with specific IC Dedicated Software', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0466-2008': 19, 'BSI-DSZ-CC-0466': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 4}}, 'cc_security_level': {'EAL': {'EAL 5': 2, 'EAL 4': 5, 'EAL4': 6, 'EAL 1': 1, 'EAL 7': 1, 'EAL5': 8, 'EAL5+': 1, 'EAL1': 5, 'EAL3': 4, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL 5 augmented': 2, 'EAL5 augmented': 2}}, 'cc_sar': {'ACM': {'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2, 'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.3': 1}, 'ADO': {'ADO_DEL': 2, 'ADO_IGS': 2, 'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 6, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA': 3, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'APE': {'APE_DES': 1, 'APE_ENV': 1, 'APE_INT': 1, 'APE_OBJ': 1, 'APE_REQ': 1, 'APE_SRE': 1}, 'ASE': {'ASE_DES': 1, 'ASE_ENV': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_PPC': 1, 'ASE_REQ': 1, 'ASE_SRE': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 1}, 'R': {'R.O': 1}}, 'vendor': {'NXP': {'NXP Semiconductors': 17, 'NXP': 9}, 'Infineon': {'Infineon Technologies AG': 1}, 'Philips': {'Philips': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 4, 'DEA': 1}, '3DES': {'Triple-DES': 5, 'TDEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 4}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 2}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'DPA': 1, 'SPA': 1}, 'FI': {'physical tampering': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 3, 'AIS 25': 3, 'AIS 26': 3, 'AIS 31': 3, 'AIS 35': 3, 'AIS 32': 1, 'AIS 36': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408:2005': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'Card Controller, NXP Semiconductors, Business Line Identification, Version 1.3, April 16th, 2008 (confidential document) [7] Evaluation Technical Report, BSI-DSZ-CC-0466, Version 1.0, April 18th, 2008, NXP P5CC052V0A': 1, 'Smart Card Controller, T-Systems (confidential document) [8] Configuration List for the NXP P5xC012/02x/037/052 family of Secure Smart Card Controllers': 1, 'Version 1.2, NXP Semiconductors, April 16th, 2008 (confidential document) [9] Security Target Lite, Evaluation of the P5CC052V0A Secure Smart Card Controller, NXP': 1, 'Secure Smart Card Controller, BSIDSZ-CC-0465, T-Systems GEI GmbH, Version 1.1, 16.04.2008 (confidential document) 8 specifically • AIS 25, Version 3, 6 August 2007, Anwendung der CC auf Integrierte Schaltungen': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0466': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 3}}, 'cc_security_level': {'EAL': {'EAL5': 34, 'EAL 5': 4, 'EAL4': 4, 'EAL5+': 1, 'EAL4+': 1, 'EAL5 augmented': 1, 'EAL 5 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 2, 'ACM_SCP.3': 5, 'ACM_SCP.2': 4, 'ACM_SCP': 4, 'ACM_AUT': 1, 'ACM_CAP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_IGS': 2, 'ADO_DEL': 2}, 'ADV': {'ADV_FSP.3': 6, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP.2': 4, 'ADV_FSP': 4, 'ADV_RCR': 4, 'ADV_SPM': 1, 'ADV_HLD': 1, 'ADV_LLD': 1, 'ADV_INT': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 3, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.3': 2, 'AVA_VLA.4': 4, 'AVA_CCA.1': 1, 'AVA_SOF.1': 2, 'AVA_MSU': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.1': 5, 'FCS_RND.1.1': 1, 'FCS_COP.1': 13, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 4, 'FCS_CKM.4': 3, 'FCS_CKM': 1}, 'FDP': {'FDP_IFC.1': 10, 'FDP_ITT.1': 6, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_ACC.1': 33, 'FDP_ACC.1.1': 2, 'FDP_ACF.1': 30, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_ITC': 1, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 3, 'FMT_MSA.2': 4, 'FMT_MSA.3': 22, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1': 29, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 2, 'FMT_SMF.1': 14, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_ITT.1': 6, 'FPT_PHP.3': 7, 'FPT_SEP.1': 15, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_AMT.1': 1}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3, 'O.MF_FW': 8, 'O.MEM_ACCESS': 8, 'O.SFR_ACCESS': 8, 'O.CONFIG': 6}, 'T': {'T.RND': 2}}, 'vendor': {'NXP': {'NXP': 80, 'NXP Semiconductors': 14}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 30, 'DEA': 2}, '3DES': {'Triple-DES': 9, 'TDEA': 3, 'Triple-DEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 11}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 13, 'Physical Probing': 2, 'physical probing': 1, 'DPA': 1, 'timing attacks': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 10, 'malfunction': 2, 'fault injection': 4}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 46': 1}, 'BSI': {'AIS31': 3}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0466a.pdf.
    • The st_filename property was set to 0466b.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0466-2008.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0690-2011', 'BSI-DSZ-CC-0691-2011', 'BSI-DSZ-CC-0692-2011', 'BSI-DSZ-CC-0601-2010']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0690-2011', 'BSI-DSZ-CC-0691-2011', 'BSI-DSZ-CC-0692-2011', 'BSI-DSZ-CC-0601-2010']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0690-2011', 'BSI-DSZ-CC-0601-2010', 'BSI-DSZ-CC-0551-2008', 'BSI-DSZ-CC-0692-2011', 'BSI-DSZ-CC-0691-2011']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0690-2011', 'BSI-DSZ-CC-0601-2010', 'BSI-DSZ-CC-0551-2008', 'BSI-DSZ-CC-0692-2011', 'BSI-DSZ-CC-0691-2011']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0466a.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0466b.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP Smart Card Controller P5CC052V0A with specific IC Dedicated Software was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "2fa3db9a7d19a435",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0466-2008",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_CCA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0690-2011",
          "BSI-DSZ-CC-0551-2008",
          "BSI-DSZ-CC-0601-2010",
          "BSI-DSZ-CC-0691-2011",
          "BSI-DSZ-CC-0692-2011"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0690-2011",
          "BSI-DSZ-CC-0551-2008",
          "BSI-DSZ-CC-0601-2010",
          "BSI-DSZ-CC-0691-2011",
          "BSI-DSZ-CC-0692-2011"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0690-2011",
          "BSI-DSZ-CC-0691-2011",
          "BSI-DSZ-CC-0692-2011",
          "BSI-DSZ-CC-0601-2010"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0690-2011",
          "BSI-DSZ-CC-0691-2011",
          "BSI-DSZ-CC-0692-2011",
          "BSI-DSZ-CC-0601-2010"
        ]
      },
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2009-09-08",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0466_ma1a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0466_ma1b_pdf.pdf",
        "maintenance_title": "NXP Smart Card Controller P5CC052V0A with specific IC Dedicated Software"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2012-07-31",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0466_ma2a_pdf.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0466_ma2b_pdf.pdf",
        "maintenance_title": "NXP Smart Card Controller P5CC052V0A/V0B with specific IC Dedicated Software"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2013-12-19",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0466_ma3a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "NXP Smart Card Controller P5CC052V0A with specific IC Dedicated Software"
      }
    ]
  },
  "manufacturer": "NXP Semiconductors",
  "manufacturer_web": "https://www.nxp.com/",
  "name": "NXP Smart Card Controller P5CC052V0A with specific IC Dedicated Software",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2008-06-24",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0466a.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0466-2008",
        "cert_item": "Smart Card Controller P5CC052V0A with specific IC Dedicated Software",
        "cert_lab": "BSI",
        "developer": "NXP Semiconductors Germany GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0466": 2,
          "BSI-DSZ-CC-0466-2008": 19
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 1
        },
        "R": {
          "R.O": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 4
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_AUT.1": 1,
          "ACM_CAP": 2,
          "ACM_CAP.4": 1,
          "ACM_SCP": 2,
          "ACM_SCP.3": 1
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 1,
          "ADO_IGS": 2,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_HLD": 2,
          "ADV_IMP": 2,
          "ADV_INT": 2,
          "ADV_LLD": 2,
          "ADV_RCR": 2,
          "ADV_SPM": 2
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_USR": 2
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.2": 6,
          "ALC_FLR": 2,
          "ALC_LCD": 1,
          "ALC_LCD.2": 1,
          "ALC_TAT": 2,
          "ALC_TAT.2": 1
        },
        "APE": {
          "APE_DES": 1,
          "APE_ENV": 1,
          "APE_INT": 1,
          "APE_OBJ": 1,
          "APE_REQ": 1,
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_DES": 1,
          "ASE_ENV": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_PPC": 1,
          "ASE_REQ": 1,
          "ASE_SRE": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_DPT": 2,
          "ATE_FUN": 2,
          "ATE_IND": 2
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_MSU": 2,
          "AVA_MSU.3": 5,
          "AVA_SOF": 3,
          "AVA_VLA": 3,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 5,
          "EAL 5": 2,
          "EAL 5 augmented": 2,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 6,
          "EAL5": 8,
          "EAL5 augmented": 2,
          "EAL5+": 1,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Card Controller, NXP Semiconductors, Business Line Identification, Version 1.3, April 16th, 2008 (confidential document) [7] Evaluation Technical Report, BSI-DSZ-CC-0466, Version 1.0, April 18th, 2008, NXP P5CC052V0A": 1,
          "Secure Smart Card Controller, BSIDSZ-CC-0465, T-Systems GEI GmbH, Version 1.1, 16.04.2008 (confidential document) 8 specifically \u2022 AIS 25, Version 3, 6 August 2007, Anwendung der CC auf Integrierte Schaltungen": 1,
          "Smart Card Controller, T-Systems (confidential document) [8] Configuration List for the NXP P5xC012/02x/037/052 family of Secure Smart Card Controllers": 1,
          "Version 1.2, NXP Semiconductors, April 16th, 2008 (confidential document) [9] Security Target Lite, Evaluation of the P5CC052V0A Secure Smart Card Controller, NXP": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 2
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 4
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "physical probing": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 25": 3,
          "AIS 26": 3,
          "AIS 31": 3,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 35": 3,
          "AIS 36": 1,
          "AIS 38": 1
        },
        "ISO": {
          "ISO/IEC 15408:2005": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 5
          },
          "DES": {
            "DEA": 1,
            "DES": 4
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies AG": 1
        },
        "NXP": {
          "NXP": 9,
          "NXP Semiconductors": 17
        },
        "Philips": {
          "Philips": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Federal Office for Information Security",
      "/CreationDate": "D:20080708134103+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"BSI-DSZ-CC-0466-2008, Smart Card Controller P5CC052V0A with specific IC Dedicated Software, NXP Semiconductors Germany GmbH\"",
      "/ModDate": "D:20080708140300+02\u002700\u0027",
      "/Producer": "StarOffice 8",
      "/Subject": "Common Criteria Zertifizierung",
      "/Title": "Zertifizierungsreport BSI-DSZ-CC-0466-2008",
      "pdf_file_size_bytes": 560116,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 36
    },
    "st_filename": "0466b.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0466": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.CONFIG": 6,
          "O.MEM_ACCESS": 8,
          "O.MF_FW": 8,
          "O.RND": 3,
          "O.SFR_ACCESS": 8
        },
        "T": {
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 3
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_AUT.1": 1,
          "ACM_CAP": 1,
          "ACM_CAP.4": 2,
          "ACM_SCP": 4,
          "ACM_SCP.2": 4,
          "ACM_SCP.3": 5
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_DEL.2": 2,
          "ADO_IGS": 2,
          "ADO_IGS.1": 2
        },
        "ADV": {
          "ADV_FSP": 4,
          "ADV_FSP.2": 4,
          "ADV_FSP.3": 6,
          "ADV_HLD": 1,
          "ADV_HLD.3": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_LLD": 1,
          "ADV_LLD.1": 1,
          "ADV_RCR": 4,
          "ADV_RCR.2": 1,
          "ADV_SPM": 1,
          "ADV_SPM.3": 1
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_ADM.1": 2,
          "AGD_USR": 2,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 3,
          "ALC_LCD": 1,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.2": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA.1": 1,
          "AVA_MSU": 2,
          "AVA_MSU.3": 2,
          "AVA_SOF.1": 2,
          "AVA_VLA.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 4,
          "EAL 5 augmented": 2,
          "EAL4": 4,
          "EAL4 augmented": 1,
          "EAL4+": 1,
          "EAL5": 34,
          "EAL5 augmented": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 4
        },
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 4,
          "FCS_CKM.4": 3,
          "FCS_COP.1": 13,
          "FCS_COP.1.1": 1,
          "FCS_RND.1": 5,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 33,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 30,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 10,
          "FDP_ITC": 1,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 4,
          "FDP_ITT.1": 6,
          "FDP_SDI.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 3,
          "FMT_LIM.2": 3,
          "FMT_MSA.1": 29,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.2": 4,
          "FMT_MSA.3": 22,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 8
        },
        "FPT": {
          "FPT_AMT.1": 1,
          "FPT_FLS.1": 7,
          "FPT_ITT.1": 6,
          "FPT_PHP.3": 7,
          "FPT_SEP.1": 15,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 7
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 1
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 5,
          "RNG": 11
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 10,
          "fault injection": 4,
          "malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 13,
          "Physical Probing": 2,
          "physical probing": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 3
        },
        "CC": {
          "CCMB-2005-08-001": 2,
          "CCMB-2005-08-002": 2,
          "CCMB-2005-08-003": 2
        },
        "FIPS": {
          "FIPS PUB 46": 1,
          "FIPS PUB 46-3": 3
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "TDEA": 3,
            "Triple-DEA": 1,
            "Triple-DES": 9
          },
          "DES": {
            "DEA": 2,
            "DES": 30
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 80,
          "NXP Semiconductors": 14
        },
        "Philips": {
          "Philips": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP SEmiconductore (Hans-Gerd Albertsen)",
      "/CreationDate": "D:20080416152002Z",
      "/Keywords": "Security IC (Smart Card)  evaluation; Assurance Level EAL5+ (AVA_VLA.4); BSI-PP-0002-2001 compliant; P5CC052V0A Security Requirements, Security Objectives and Security Functions",
      "/ModDate": "D:20080708140426+02\u002700\u0027",
      "/Producer": "AFPL Ghostscript 8.14",
      "/Subject": "P5CC052V0A Common Criteria Evaluation",
      "/Title": "Security Target Lite P5CC052V0A",
      "pdf_file_size_bytes": 634160,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 68
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0466a.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_MSU.3",
      "EAL5+",
      "AVA_VLA.4",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0466b.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "5f7707d6431f328cd866e4d25a7d21000626edfb74f964a8a26b7f54552b181f",
      "txt_hash": "8f9af258ab012cd09c9c9b6ecef3f4a6c298efb0e55aa77d48907ea9be0105ef"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "361f2c1615445eeb440b6be5bdf901f57d7090513864c5a5c058598dc85f6a13",
      "txt_hash": "4f453bafae15693fbdc7d33cbd4b88172892ef40c1d200935c6fdbba1cc5c633"
    }
  },
  "status": "archived"
}