This page was not yet optimized for use on mobile
devices.
NXP Smart Card Controller P5CD080V0C, P5CN080V0C, P5CC080V0C, P5CC073V0C each with IC Dedicated Software
CSV information
| Status | archived |
|---|---|
| Valid from | 11.06.2010 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | NXP Semiconductors |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VLA.4, ADV_IMP.2, AVA_MSU.3, EAL4+, ATE_DPT.2 |
| Protection profiles |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0625-2010
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEARandomness
RNGVendor
NXP, NXP Semiconductors, PhilipsSecurity level
EAL 5, EAL 4, EAL4, EAL1, EAL5+, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 5 augmented, ITSEC EvaluationClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ADO_DEL, ADO_IGS, ADO_DEL.2, ADO_IGS.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ALC_LCD.2, ALC_TAT.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSSProtection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0625-2010, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0625Side-channel analysis
physical probing, DPA, SPA, physical tampering, JILCertification process
Card Controllers, NXP Semiconductors, Business Line Identification, Version 1.0, June 8th, 2009 (confidential document) [7] Evaluation Technical Report BSI-DSZ-CC-0625 NXP P5CD080V0C Secure Smart Card Controller, 1.1, February 1st, 2010, (confidential document) [8] Configuration List of the P5CD080/ P5CC80/ P5CN080/ P5CC073 V0C, NXP Semiconductors, Rev. 1.0, 11th, 2009 (confidential document) [9] Security Target Lite BSI-DSZ-0625-2009, Evaluation of the NXP P5CD080V0C, P5CN080V0CStandards
AIS 34, AIS 25, AIS 26, AIS 31, AIS 36, AIS 20, AIS 32, AIS 35, AIS 38, ISO/IEC 15408:2005Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
| Title | Certification Report BSI-DSZ-CC-0625-2010 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | NXP Smart Card Controller P5CD080V0C, P5CN080V0C, P5CC080V0C, P5CC073V0C each with IC Dedicated Software, NXP Semiconductors Germany GmbH, Common Criteria, Zertifizierung, CC, Certification |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20100625110718+02'00' |
| Modification date | D:20100629151150+02'00' |
| Pages | 38 |
| Creator | Writer |
| Producer | OpenOffice.org 3.1 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0625-2010 |
|---|---|
| Certified item | NXP Smart Card Controller P5CD080V0C, P5CN080V0C, P5CC080V0C, P5CC073V0C each with IC Dedicated Software |
| Certification lab | BSI |
| Developer | NXP Semiconductors Germany GmbH |
References
Outgoing- BSI-DSZ-CC-0410-2007 - archived - NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEA, Triple-DEAAsymmetric Algorithms
ECCRandomness
TRNG, RND, RNGBlock cipher modes
CCMVendor
NXP Semiconductors, NXP, PhilipsSecurity level
EAL5, EAL4, EAL 5, EAL5+, EAL4+, EAL5 augmented, EAL4 augmented, EAL 5 augmentedClaims
O.RND, O.HW_AES, O.MF_FW, O.MEM_ACCES, O.SFR_ACCESS, O.CONFIG, O.H, O.M, O.P, O.HW_AE, O.MEM_ACCESS, O.SFR_ACCE, O.HW, O.SFR, O.CONFI, T.RNDSecurity Assurance Requirements (SAR)
ACM_AUT, ACM_CAP.4, ACM_SCP, ACM_SCP.3, ACM_CAP, ACM_SCP.2, ADO_DEL, ADO_IGS.1, ADO_DEL.2, ADO_IGS, ADV_FSP, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR, ADV_SPM.3, ADV_FSP.3, ADV_FSP.2, ADV_SPM, ADV_HLD, ADV_LLD, ADV_INT, ADV_IMP, AGD_ADM, AGD_USR, AGD_USR.1, ALC_DVS, ALC_LCD.2, ALC_TAT.2, ALC_DVS.2, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT, ATE_FUN, ATE_IND.2, AVA_VLA.4, AVA_CCA.1, AVA_MSU.3, AVA_SOF.1, AVA_MSUSecurity Functional Requirements (SFR)
FAU_SAS.1, FCS_RND.1, FCS_RND.1.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FCS_CKM, FCS_COP, FDP_IFC.1, FDP_ITT.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACC.1, FDP_ACF.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ACF.1.1, FDP_ITC, FDP_SDI.1, FDP_ACC, FMT_LIM.1, FMT_LIM.2, FMT_MSA, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.2, FMT_SMF, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FPT_SEP.1.2, FPT_SEP.1.1, FPT_AMT.1, FRU_FLT.2, FRU_FLTProtection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0625-2009Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, DPA, timing attacks, Malfunction, malfunction, fault injectionStandards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 46, FIPS PUB 19, AIS31, CCMB-2005-08-002, CCMB-2005-08-004File metadata
| Title | Security Target Lite - P5CD080V0C/ P5CN080V0C/ P5CC080V0C/ P5CC073V0C |
|---|---|
| Subject | Common Criteria Evaluation of SmatMX Crypto Controller |
| Keywords | Security Target Lite; SmartMX; P5CD080V0C; P5CN080V0C; P5CN080V0C; P5CC073V0C; NXP; EAL5+; AVA_VLA.4; BSI-DSZ-CC-0625-2009; AES; DES |
| Author | CRe |
| Creation date | D:20100629123013+02'00' |
| Modification date | D:20100629131840+02'00' |
| Pages | 74 |
| Creator | Acrobat PDFMaker 8.1 for Word |
| Producer | Acrobat Distiller 8.1.0 (Windows) |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0625-2010Extracted SARs
ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_SPM.3, AGD_USR.1, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ATE_COV.2, ATE_DPT.2, ATE_IND.2, AVA_CCA.1, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "ade8ca8ad8cb9336",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0625-2010",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_CCA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"f6d23054061d72ba"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0410-2007"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0410-2007",
"BSI-DSZ-CC-0404-2007"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "NXP Semiconductors",
"manufacturer_web": "https://www.nxp.com/",
"name": "NXP Smart Card Controller P5CD080V0C, P5CN080V0C, P5CC080V0C, P5CC073V0C each with IC Dedicated Software",
"not_valid_after": "2019-09-01",
"not_valid_before": "2010-06-11",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0625a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0625-2010",
"cert_item": "NXP Smart Card Controller P5CD080V0C, P5CN080V0C, P5CC080V0C, P5CC073V0C each with IC Dedicated Software",
"cert_lab": "BSI",
"developer": "NXP Semiconductors Germany GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0410-2007": 3,
"BSI-DSZ-CC-0625": 2,
"BSI-DSZ-CC-0625-2010": 20
}
},
"cc_claims": {
"O": {
"O.C": 2
},
"R": {
"R.O": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 4
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 1,
"ACM_CAP": 2,
"ACM_CAP.4": 1,
"ACM_SCP": 2,
"ACM_SCP.3": 1
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 1,
"ADO_IGS": 2,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP": 2,
"ADV_HLD": 2,
"ADV_IMP": 2,
"ADV_INT": 2,
"ADV_LLD": 2,
"ADV_RCR": 2,
"ADV_SPM": 2
},
"AGD": {
"AGD_ADM": 2,
"AGD_USR": 2
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 6,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 2,
"ALC_TAT.2": 1
},
"APE": {
"APE_DES": 1,
"APE_ENV": 1,
"APE_INT": 1,
"APE_OBJ": 1,
"APE_REQ": 1,
"APE_SRE": 1
},
"ASE": {
"ASE_DES": 1,
"ASE_ENV": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_PPC": 1,
"ASE_REQ": 1,
"ASE_SRE": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_DPT": 2,
"ATE_FUN": 2,
"ATE_IND": 2
},
"AVA": {
"AVA_CCA": 2,
"AVA_MSU": 2,
"AVA_MSU.3": 5,
"AVA_SOF": 3,
"AVA_VLA": 3,
"AVA_VLA.2": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 5,
"EAL 5": 4,
"EAL 5 augmented": 3,
"EAL1": 6,
"EAL2": 3,
"EAL3": 4,
"EAL4": 9,
"EAL5": 6,
"EAL5+": 1,
"EAL6": 3,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"1.1, February 1st, 2010, (confidential document) [8] Configuration List of the P5CD080/ P5CC80/ P5CN080/ P5CC073 V0C, NXP Semiconductors, Rev. 1.0": 1,
"11th, 2009 (confidential document) [9] Security Target Lite BSI-DSZ-0625-2009, Evaluation of the NXP P5CD080V0C, P5CN080V0C": 1,
"Card Controllers, NXP Semiconductors, Business Line Identification, Version 1.0, June 8th, 2009 (confidential document) [7] Evaluation Technical Report BSI-DSZ-CC-0625 NXP P5CD080V0C Secure Smart Card Controller": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 4
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 1
},
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 25": 3,
"AIS 26": 2,
"AIS 31": 3,
"AIS 32": 1,
"AIS 34": 3,
"AIS 35": 1,
"AIS 36": 2,
"AIS 38": 1
},
"ISO": {
"ISO/IEC 15408:2005": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
}
},
"DES": {
"3DES": {
"TDEA": 1,
"Triple-DES": 6
},
"DES": {
"DEA": 1,
"DES": 5
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 19,
"NXP Semiconductors": 15
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20100625110718+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "NXP Smart Card Controller P5CD080V0C, P5CN080V0C, P5CC080V0C, P5CC073V0C each with IC Dedicated Software, NXP Semiconductors Germany GmbH, Common Criteria, Zertifizierung, CC, Certification",
"/ModDate": "D:20100629151150+02\u002700\u0027",
"/Producer": "OpenOffice.org 3.1",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0625-2010",
"pdf_file_size_bytes": 528053,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "0625b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0625-2009": 1
}
},
"cc_claims": {
"O": {
"O.CONFI": 1,
"O.CONFIG": 5,
"O.H": 2,
"O.HW": 1,
"O.HW_AE": 1,
"O.HW_AES": 2,
"O.M": 1,
"O.MEM_ACCES": 1,
"O.MEM_ACCESS": 6,
"O.MF_FW": 7,
"O.P": 1,
"O.RND": 3,
"O.SFR": 1,
"O.SFR_ACCE": 1,
"O.SFR_ACCESS": 6
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 1
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_CAP": 2,
"ACM_CAP.4": 1,
"ACM_SCP": 5,
"ACM_SCP.2": 3,
"ACM_SCP.3": 5
},
"ADO": {
"ADO_DEL": 3,
"ADO_DEL.2": 1,
"ADO_IGS": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 6,
"ADV_FSP.2": 3,
"ADV_FSP.3": 6,
"ADV_HLD": 1,
"ADV_HLD.3": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_LLD": 1,
"ADV_LLD.1": 1,
"ADV_RCR": 5,
"ADV_SPM": 1,
"ADV_SPM.3": 1
},
"AGD": {
"AGD_ADM": 4,
"AGD_USR": 3,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 1,
"ALC_LCD": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.2": 1
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA.1": 1,
"AVA_MSU": 2,
"AVA_MSU.3": 1,
"AVA_SOF.1": 2,
"AVA_VLA.4": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 4,
"EAL 5 augmented": 2,
"EAL4": 4,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL5": 34,
"EAL5 augmented": 1,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 4
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 4,
"FCS_CKM.4": 4,
"FCS_COP": 1,
"FCS_COP.1": 22,
"FCS_COP.1.1": 2,
"FCS_RND.1": 2,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC": 1,
"FDP_ACC.1": 27,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 26,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 9,
"FDP_ITC": 1,
"FDP_ITC.1": 3,
"FDP_ITC.2": 5,
"FDP_ITT.1": 6,
"FDP_SDI.1": 1
},
"FMT": {
"FMT_LIM.1": 3,
"FMT_LIM.2": 3,
"FMT_MSA": 1,
"FMT_MSA.1": 26,
"FMT_MSA.1.1": 2,
"FMT_MSA.2": 3,
"FMT_MSA.3": 20,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_SMF": 1,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 8
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS.1": 6,
"FPT_ITT.1": 5,
"FPT_PHP.3": 7,
"FPT_SEP.1": 15,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1
},
"FRU": {
"FRU_FLT": 2,
"FRU_FLT.2": 5
}
},
"certification_process": {},
"cipher_mode": {
"CCM": {
"CCM": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 9
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 7,
"fault injection": 4,
"malfunction": 1
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 9,
"Physical Probing": 1,
"physical probing": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 3
},
"CC": {
"CCMB-2005-08-002": 1,
"CCMB-2005-08-004": 1
},
"FIPS": {
"FIPS PUB 19": 1,
"FIPS PUB 197": 2,
"FIPS PUB 46": 1,
"FIPS PUB 46-3": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 37
}
},
"DES": {
"3DES": {
"TDEA": 3,
"Triple-DEA": 1,
"Triple-DES": 9
},
"DES": {
"DEA": 1,
"DES": 26
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 90,
"NXP Semiconductors": 14
},
"Philips": {
"Philips": 3
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "CRe",
"/Company": "NXP Semiconductors Germany GmbH",
"/CreationDate": "D:20100629123013+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 8.1 for Word",
"/Keywords": "Security Target Lite; SmartMX; P5CD080V0C; P5CN080V0C; P5CN080V0C; P5CC073V0C; NXP; EAL5+; AVA_VLA.4; BSI-DSZ-CC-0625-2009; AES; DES",
"/Manager": "Stefan Philipp",
"/ModDate": "D:20100629131840+02\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/SourceModified": "D:20090714141753",
"/Subject": "Common Criteria Evaluation of SmatMX Crypto Controller",
"/Title": "Security Target Lite - P5CD080V0C/ P5CN080V0C/ P5CC080V0C/ P5CC073V0C",
"pdf_file_size_bytes": 650325,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 74
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0625a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ADV_IMP.2",
"EAL4+",
"ATE_DPT.2",
"AVA_VLA.4",
"AVA_MSU.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0625b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "12b2875baeea8c2d0e7a71c4d3c689205cffbc727ea3d49285dd320c817058aa",
"txt_hash": "667c48cb57ab4afb0cf81ec8477155df06fadd684d9e7fc41f350f04a81cba21"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9bb6962bdd02e9a3042c1ec4704071940b017c28b5729398ba35c9cb1f01cbb6",
"txt_hash": "8fa81ae1aa2fa13576ac5b625804d2cb0a8fa2c8f565aaa1b5cd87037d647a1c"
}
},
"status": "archived"
}