NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software

CSV information ?

Status archived
Valid from 12.06.2013
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer NXP Semiconductors Germany GmbH Business Line Identification
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, ALC_DVS.2, ASE_TSS.2, EAL5+
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0858-2013

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES
Randomness
RNG

Vendor
NXP, NXP Semiconductors, Philips

Security level
EAL 5, EAL 4, EAL1, EAL4, EAL5, EAL5+, EAL6, EAL3, EAL7, EAL2, EAL 5 augmented, ITSEC Evaluation
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMS.5, ALC_TAT.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_DPT.3, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_TSS.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0035-2007
Certificates
BSI-DSZ-CC-0858-2013, BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0858

Side-channel analysis
physical probing, side channel, physical tampering, reverse engineering, JIL
Certification process
P5Cx128/P5Cx145 V0v/ V0B(s) Security Target, NXP Semiconductors, Business Unit Identification (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8, Report, Version 1.5, 10 May 2013, Evaluation Technical Report BSI-DSZ-CC-0858, T-Systems GEI GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36, Version 1.0, 22 April 2013, ETR for, according to AIS36 as summary of the Evaluation Technical Report, T-Systems GEI GmbH (confidential document) [11] Configuration lists for the TOE: • Configuration List P5Cx128/P5Cx145 V0v/ V0B(s), NXP, Business Unit Identification, Rev. 2.0, April 26th, 2013 (confidential document) 8 specifically • AIS 25, Version 7, Anwendung der CC auf Integrierte Schaltungen including JIL

Standards
AIS 34, AIS 25, AIS 37, AIS 31, AIS 36, AIS 35, AIS36, AIS 26, AIS 32, AIS 38, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 18092
Technical reports
BSI TR-02102, BSI 7125, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0858-2013
Subject Common Criteria Certification
Keywords "Common Criteria, Certification, Zertifizierung, Smartcard"
Author Bundesamt fĂĽr Sicherheit in der Informationstechnik
Creation date D:20130625154417+02'00'
Modification date D:20130625154905+02'00'
Pages 40
Creator Writer
Producer LibreOffice 3.6

Frontpage

Certificate ID BSI-DSZ-CC-0858-2013
Certified item NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software
Certification lab BSI
Developer NXP Semiconductors Germany GmbH

References

Outgoing
  • BSI-DSZ-CC-0645-2010 - archived - NXP Secure PKI Smart Card Controllers P5CD145V0A, MSO; P5CC145V0A, MSO; P5CD128V0A, MSO and P5CC128V0A, MSO; each including IC Dedicated Software
Incoming
  • BSI-DSZ-CC-0867-2014 - archived - IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0 (BAC)
  • BSI-DSZ-CC-0858-V2-2015 - archived - NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software
  • BSI-DSZ-CC-0911-2014 - archived - cv act ePasslet Suite v2.1 – Java Card applet configuration providing Machine Readable Travel Document with “ICAO Application”, Basic Access Control (BAC)
  • BSI-DSZ-CC-0866-2013 - archived - IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0
  • BSI-DSZ-CC-0914-2014 - archived - cv act ePasslet Suite v2.1 – Java Card applet configuration providing Secure Signature Device with Key generation (SSCD)
  • BSI-DSZ-CC-0912-2014 - archived - cv act ePasslet Suite v2.1 – Java Card applet configuration providing Machine Readable Travel Document with “ICAO Application”, Extended Access Control (EAC)
  • BSI-DSZ-CC-0750-V2-2014 - archived - Crypto Library V2.7/2.9 on SmartMX P5Cx128/P5Cx145 V0v/ VOB(s)
  • BSI-DSZ-CC-0913-2014 - archived - cv act ePasslet Suite v2.1 – Java Card applet configuration providing Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE
  • NSCIB-CC-13-37760-CR2 - archived - J3E145_M64, J3E120_M65, J3E082_M65, J2E145_M64, J2E120_M65, and J2E082_M65 Secure Smart Card Controller Revision 3
  • BSI-DSZ-CC-0866-V2-2014 - archived - IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEA, Triple-DEA
Asymmetric Algorithms
ECC
Randomness
TRNG, RND, RNG

Vendor
NXP, NXP Semiconductors, Philips

Security level
EAL 5, EAL5, EAL4, EAL5+, EAL4+, EAL 5 augmented, EAL4 augmented
Claims
O.RND, O.HW_AES, O.MF_FW, O.MEM_ACCESS, O.SFR_ACCESS, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_ARC, ADV_FSP, ADV_IMP, ADV_FSP.4, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMS.4, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ITT.1, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2
Protection profiles
BSI-PP- 0035
Certificates
BSI-DSZ-CC-0858

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injection

Standards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 46, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 18092, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004
Technical reports
BSI 1

File metadata

Title Security Target Lite P5Cx128/P5Cx145 V0v/ V0B(s)
Subject Security Target Lite
Keywords CC; Security Evaluation; Security Target Lite; Functional Requirements; Security Functionality; Assurance Level; P5Cx128/P5Cx145 V0v/ V0B(s); P5CD145; P5CD128; P5CC145; P5CC128; P5CN145; MIFARE MSO; MIFARE FleX™
Author NXP Semiconductors
Creation date D:20121119165646+01'00'
Modification date D:20121119170042+01'00'
Pages 74
Creator Acrobat PDFMaker 9.1 for Word
Producer Adobe PDF Library 9.0

References

Incoming
  • BSI-DSZ-CC-0867-2014 - archived - IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0 (BAC)
  • BSI-DSZ-CC-0911-2014 - archived - cv act ePasslet Suite v2.1 – Java Card applet configuration providing Machine Readable Travel Document with “ICAO Application”, Basic Access Control (BAC)
  • BSI-DSZ-CC-0866-2013 - archived - IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0
  • BSI-DSZ-CC-0914-2014 - archived - cv act ePasslet Suite v2.1 – Java Card applet configuration providing Secure Signature Device with Key generation (SSCD)
  • BSI-DSZ-CC-0912-2014 - archived - cv act ePasslet Suite v2.1 – Java Card applet configuration providing Machine Readable Travel Document with “ICAO Application”, Extended Access Control (EAC)
  • BSI-DSZ-CC-0913-2014 - archived - cv act ePasslet Suite v2.1 – Java Card applet configuration providing Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE
  • BSI-DSZ-CC-0866-V2-2014 - archived - IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0

Heuristics ?

Certificate ID: BSI-DSZ-CC-0858-2013

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_SPM.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.3, ALC_LCD.1, ALC_TAT.2, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Similar certificates

Name Certificate ID
NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software BSI-DSZ-CC-0858-V2-2015 Compare
NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/V1A(s) each including IC Dedicated Software BSI-DSZ-CC-0855-2013 Compare
NXP Secure PKI Smart Card Controllers P5CD145V0A, MSO; P5CC145V0A, MSO; P5CD128V0A, MSO and P5CC128V0A, MSO; each including IC Dedicated Software BSI-DSZ-CC-0645-2010 Compare
NXP Secure Smart Card Controllers P5CC008V1A, P5CC012V1A each including IC Dedicated Software BSI-DSZ-CC-0771-2011 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V4-2021 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V3-2019 Compare
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software BSI-DSZ-CC-0977-V3-2021 Compare
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software BSI-DSZ-CC-0977-V2-2019 Compare
NXP Secure Smart Card Controller P61N1M3PVD/VE including IC Dedicated Software BSI-DSZ-CC-0824-2014 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-2018 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-2018 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V5-2022 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V5-2022 Compare
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software BSI-DSZ-CC-0977-2017 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V2-2019 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V3-2019 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V4-2021 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V2-2019 Compare
NXP Secure Smart Card Controller P6021y VA including IC Dedicated Software BSI-DSZ-CC-0981-2016 Compare
NXP Secure Smart Card Controller P60x017/041PVD including IC Dedicated Software BSI-DSZ-CC-0896-2014 Compare
NXP Secure Smart Card Controller P60x017/041PVE including IC Dedicated Software BSI-DSZ-CC-0954-2015 Compare
NXP Secure Smart Card Controller P60D144/080MVA including IC Dedicated Software with MIFARE Plus MF1PLUSx0 BSI-DSZ-CC-0840-2013 Compare
NXP Secure Smart Card Controller P60D024/016/012MVB including IC Dedicated Software with MIFARE Plus MF1PLUSx0 BSI-DSZ-CC-0842-2013 Compare
NXP Secure Smart Card Controller P60D080/052/040MVC including IC Dedicated Software with MIFARE Plus MF1PLUSx0 BSI-DSZ-CC-0871-2013 Compare
NXP Secure Smart Card Controller P5CT072V0N, P5CD072V0N, P5CD036V0N, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software BSI-DSZ-CC-0375-2007 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB including IC Dedicated Software with MIFARE Plus MF1PLUSx0 or MIFARE DESFire EV1 BSI-DSZ-CC-0830-2013 Compare
NXP Secure Smart Card Controller P60x144/080yVA including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 BSI-DSZ-CC-0870-2014 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB/yVB(Y) including IC Dedicated Software with MIFARE Plus MF1PLUSx0 or MIFARE DESFire EV1 BSI-DSZ-CC-0830-V2-2014 Compare
NXP Secure Smart Card Controller P60D080/052/040yVC including IC Dedicated Software with MIFARE Plus MF1PLUSx0 or with MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 BSI-DSZ-CC-0897-2013 Compare
NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 BSI-DSZ-CC-0897-V2-2014 Compare
NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6021P VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6021M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0955-2016 Compare
NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6021P VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6021M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0955-V2-2016 Compare
NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0973-2016 Compare
NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0973-V2-2016 Compare
NXP Secure Smart Card Controller MF3F60x1 with IC Dedicated Support Software BSI-DSZ-CC-0587-2010 Compare
NXP Secure Smart Card Controller P60D024/016/012PVB with IC Dedicated Software BSI-DSZ-CC-0810-2012 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library BSI-DSZ-CC-1040-2019 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1) BSI-DSZ-CC-1149-2022 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software BSI-DSZ-CC-0410-2007 Compare
NXP P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software BSI-DSZ-CC-0584-2009 Compare
NXP Secure Smart Card Controller P60x144/080PVA with IC Dedicated Software FW5.0 BSI-DSZ-CC-0845-2012 Compare
NXP Secure Smart Card Controller P5CD144V0B, P5CN144V0B and P5CC144V0B each with specific IC Dedicated Software BSI-DSZ-CC-0411-2007 Compare
NXP Secure Smart Card Controller P5CD040V0B, P5CC040V0B, P5CD020V0B and P5CC021V0B each with specific IC Dedicated Software BSI-DSZ-CC-0404-2007 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CC080V0B, P5CN080V0B, P5CC073V0B each with specific IC Dedicated Software BSI-DSZ-CC-0700-2011 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B and P5CC073V0B each with specific IC Dedicated Software BSI-DSZ-CC-0680-2010 Compare
NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software BSI-DSZ-CC-0810-V2-2014 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1149-V2-2023 Compare
NXP Secure Smart Card Controller P60x144/080PVA/PVA(Y) with IC Dedicated Software FW5.0 BSI-DSZ-CC-0845-V2-2013 Compare
NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0 BSI-DSZ-CC-0440-2008 Compare
NXP Smart Card Controller P5CC052V0A with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0551-2008 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1136-V2-2022 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software BSI-DSZ-CC-0939-V3-2018 Compare
NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)PVG with IC Dedicated Software BSI-DSZ-CC-0837-V2-2014 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1149-V3-2023 Compare
NXP Smart Card Controller P5CC037V0A with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0550-2008 Compare
NXP Secure Smart Card Controller P60x080/052/040yVC(Y/Z/A)/yVG with IC Dedicated Software BSI-DSZ-CC-0837-V3-2016 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software BSI-DSZ-CC-0939-V2-2016 Compare
NXP Secure Smart Card Controller P60D024/016/012PVB(Y/Z/A)/PVF with IC Dedicated Software BSI-DSZ-CC-0939-2015 Compare
NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software BSI-DSZ-CC-0978-V2-2017 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) BSI-DSZ-CC-1136-V3-2022 Compare
NXP Smart Card Controller P5CD040V0B with IC dedicated software: Secured Crypto Library Release 2.0 to EAL5+ BSI-DSZ-CC-0439-2008 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) BSI-DSZ-CC-1136-V4-2024 Compare
NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software BSI-DSZ-CC-0978-2016 Compare
NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software BSI-DSZ-CC-0978-V3-2019 Compare
Philips Secure Smart Card Controller P5CT072V0N including OM9500/1 and OM9501/2, P5CD072V0N and P5CD036V0N with specific IC Dedicated Software BSI-DSZ-CC-0312-2005 Compare
Philips Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q,P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software BSI-DSZ-CC-0349-2006 Compare
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A, P5CC012V0A all with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0549-2008 Compare
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0a and P5CC012V0A each with IC Dedicated Software: Secured Crypto Library Release 2.0 to CC EAL5+ BSI-DSZ-CC-0464-2008 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software BSI-DSZ-CC-0827-V8-2020 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Toolbox, Base, FTL, SCL, HCL, and PSL, and with specific IC dedicated software BSI-DSZ-CC-0827-V7-2018 Compare
Infineon smart card IC (Security Controller) M9900 A21 with specific IC dedicated software BSI-DSZ-CC-0791-2012 Compare
Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software BSI-DSZ-CC-0827-V4-2016 Compare
Infineon Smart Card IC (Security Controller), SLE66CL80P / m1457a14 and SLE66CL81P / m1436a14 with specific IC Dedicated Software BSI-DSZ-CC-0401-2006 Compare
Infineon Smart Card IC (Security Controller) SLE66CX642P/m1485b16 with RSA 2048 V1.30 and specific IC Dedicated Software BSI-DSZ-CC-0315-2005 Compare
Infineon Smart Card IC (Security Controller) SLE66CL80P/m1457-a14 and SLE66CL81P/m1436-a14 with specific IC Dedicated Software BSI-DSZ-CC-0354-2006 Compare
Infineon Smart Card IC (Security Controller) SLE66CLX320P / m1559b19 and SLE66CLX321P / m1359b19 both with RSA2048 V1.3 and specific IC Dedicated Software BSI-DSZ-CC-0337-2005 Compare
Infineon Smart Card IC (Security Controller) SLE66CX322P/m1484b14 and m1484f18 with RSA 2048 V1.30 and specific IC Dedicated Software BSI-DSZ-CC-0266-2005 Compare
Showing 5 out of 77.

References ?

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': ['BSI-DSZ-CC-0858-V2-2015']}.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_V1.0', 'PKISKPP']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '99e6b557d620ed143d22afe30e4ad1f0b55f59a7ee517d4c31c5e4d09c066bff', 'txt_hash': '04e76fef73e5028f83a7114739c8986cdb1f6c30431c26830a2a879ba0826cf8'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '868c46d5480c8d382b99ed2f470e81e784b55b9b816da74bfec56935abf8169a', 'txt_hash': '89ff57616b0513e1fbe5e60030a3cd377869be74753465903fc713368cf95ade'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1023773, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 40, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/CreationDate': "D:20130625154417+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Smartcard"', '/ModDate': "D:20130625154905+02'00'", '/Producer': 'LibreOffice 3.6', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-0858-2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierung']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 616053, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 74, '/Author': 'NXP Semiconductors', '/CreationDate': "D:20121119165646+01'00'", '/Creator': 'Acrobat PDFMaker 9.1 for Word', '/Keywords': 'CC; Security Evaluation; Security Target Lite; Functional Requirements; Security Functionality; Assurance Level; P5Cx128/P5Cx145 V0v/ V0B(s); P5CD145; P5CD128; P5CC145; P5CC128; P5CN145; MIFARE MSO; MIFARE FleX™', '/ModDate': "D:20121119170042+01'00'", '/Producer': 'Adobe PDF Library 9.0', '/Subject': 'Security Target Lite', '/Title': 'Security Target Lite P5Cx128/P5Cx145 V0v/ V0B(s)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.nxp.com/\x00', 'mailto:[email protected]\x00', 'https://extranet.nxp.com/\x00']}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0858-2013', 'cert_item': 'NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0858-2013': 23, 'BSI-DSZ-CC-0645-2010': 3, 'BSI-DSZ-CC-0858': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 4}}, 'cc_security_level': {'EAL': {'EAL 5': 7, 'EAL 4': 3, 'EAL1': 7, 'EAL4': 7, 'EAL5': 7, 'EAL5+': 1, 'EAL6': 4, 'EAL3': 4, 'EAL7': 4, 'EAL2': 3, 'EAL 5 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_INT.2': 2, 'ADV_TDS.4': 2, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_CMS.5': 3, 'ALC_TAT.2': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_DPT.3': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_TSS.2': 6, 'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 4}, 'R': {'R.O': 4}}, 'vendor': {'NXP': {'NXP': 21, 'NXP Semiconductors': 29}, 'Philips': {'Philips': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 2}, '3DES': {'Triple-DES': 5}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 4}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side channel': 2}, 'FI': {'physical tampering': 1}, 'other': {'reverse engineering': 1, 'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 25': 3, 'AIS 37': 1, 'AIS 31': 2, 'AIS 36': 3, 'AIS 35': 2, 'AIS36': 1, 'AIS 26': 1, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 18092': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'P5Cx128/P5Cx145 V0v/ V0B(s) Security Target, NXP Semiconductors, Business Unit Identification (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8': 1, 'Report, Version 1.5, 10 May 2013, Evaluation Technical Report BSI-DSZ-CC-0858, T-Systems GEI GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36, Version 1.0, 22 April 2013, ETR for': 1, 'according to AIS36 as summary of the Evaluation Technical Report, T-Systems GEI GmbH (confidential document) [11] Configuration lists for the TOE: • Configuration List P5Cx128/P5Cx145 V0v/ V0B(s), NXP': 1, 'Business Unit Identification, Rev. 2.0, April 26th, 2013 (confidential document) 8 specifically • AIS 25, Version 7, Anwendung der CC auf Integrierte Schaltungen including JIL': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0858': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP- 0035': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL5': 32, 'EAL4': 3, 'EAL5+': 1, 'EAL4+': 1, 'EAL 5 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 11, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1, 'ADV_ARC': 1, 'ADV_FSP': 4, 'ADV_IMP': 1, 'ADV_FSP.4': 3}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_CMC.4': 1, 'ALC_CMS.5': 5, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 4, 'ALC_CMC': 1, 'ALC_CMS.4': 3}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 5, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 5, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG.1': 4, 'FCS_RNG.1.1': 3, 'FCS_RNG.1.2': 2, 'FCS_COP.1': 22, 'FCS_COP.1.1': 2, 'FCS_CKM.1': 5, 'FCS_CKM.4': 3}, 'FDP': {'FDP_ITT.1': 6, 'FDP_IFC.1': 10, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5, 'FDP_ACC.1': 33, 'FDP_ACC.1.1': 2, 'FDP_ACF.1': 30, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 3, 'FMT_MSA.3': 18, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1': 25, 'FMT_SMR.1': 7, 'FMT_MSA.1.1': 2, 'FMT_SMF.1': 14, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_PHP.3': 7, 'FPT_ITT.1': 6}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3, 'O.HW_AES': 7, 'O.MF_FW': 7, 'O.MEM_ACCESS': 9, 'O.SFR_ACCESS': 7}, 'T': {'T.RND': 2}}, 'vendor': {'NXP': {'NXP': 100, 'NXP Semiconductors': 28}, 'Philips': {'Philips': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 33}}, 'DES': {'DES': {'DES': 26, 'DEA': 2}, '3DES': {'Triple-DES': 9, 'TDEA': 3, 'Triple-DEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 7}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 13, 'Physical Probing': 2, 'physical probing': 1, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 10, 'malfunction': 2, 'fault injection': 5}}, 'technical_report_id': {'BSI': {'BSI 1': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 197': 3, 'FIPS PUB 46': 1}, 'ISO': {'ISO/IEC 7816': 10, 'ISO/IEC 14443': 14, 'ISO/IEC 18092': 2}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0858a_pdf.pdf.
    • The st_filename property was set to 0858b_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0858-2013.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0914-2014', 'BSI-DSZ-CC-0866-V2-2014', 'BSI-DSZ-CC-0912-2014', 'BSI-DSZ-CC-0866-2013', 'BSI-DSZ-CC-0867-2014', 'BSI-DSZ-CC-0913-2014', 'BSI-DSZ-CC-0911-2014']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0914-2014', 'BSI-DSZ-CC-0866-V2-2014', 'BSI-DSZ-CC-0912-2014', 'BSI-DSZ-CC-0866-2013', 'BSI-DSZ-CC-0867-2014', 'BSI-DSZ-CC-0913-2014', 'BSI-DSZ-CC-0911-2014']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-13-37760-CR2', 'BSI-DSZ-CC-0914-2014', 'BSI-DSZ-CC-0750-V2-2014', 'BSI-DSZ-CC-0866-V2-2014', 'BSI-DSZ-CC-0912-2014', 'BSI-DSZ-CC-0866-2013', 'BSI-DSZ-CC-0867-2014', 'BSI-DSZ-CC-0913-2014', 'BSI-DSZ-CC-0858-V2-2015', 'BSI-DSZ-CC-0911-2014']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0914-2014', 'BSI-DSZ-CC-0750-V2-2014', 'OCSI/CERT/SYS/04/2015/RC', 'BSI-DSZ-CC-0866-2013', 'BSI-DSZ-CC-0867-2014', 'BSI-DSZ-CC-0858-V2-2015', 'OCSI/CERT/SYS/05/2016/RC', 'OCSI/CERT/CCL/05/2021/RC', 'OCSI/CERT/CCL/09/2022/RC', 'BSI-DSZ-CC-0913-2014', 'NSCIB-CC-13-37760-CR2', 'OCSI/CERT/SYS/05/2015/RC', 'OCSI/CERT/CCL/06/2021/RC', 'OCSI/CERT/SYS/02/2016/RC', 'BSI-DSZ-CC-0866-V2-2014', 'OCSI/CERT/SYS/06/2016/RC', 'BSI-DSZ-CC-0912-2014', 'OCSI/CERT/SYS/03/2016/RC', 'BSI-DSZ-CC-0911-2014']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0645-2010']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0645-2010']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values added.
    • The direct_transitive_cves property was set to {'_type': 'Set', 'elements': ['CVE-2021-3011']}.
    • The indirect_transitive_cves property was set to {'_type': 'Set', 'elements': ['CVE-2021-3011']}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0858a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0858b_pdf.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}]} values discarded.
    • The direct_transitive_cves property was set to None.
    • The indirect_transitive_cves property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "599718493fd9fb1f",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0858-2013",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2021-3011"
      ]
    },
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": {
      "_type": "Set",
      "elements": [
        "CVE-2021-3011"
      ]
    },
    "next_certificates": [
      "BSI-DSZ-CC-0858-V2-2015"
    ],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0914-2014",
          "BSI-DSZ-CC-0858-V2-2015",
          "BSI-DSZ-CC-0912-2014",
          "BSI-DSZ-CC-0866-2013",
          "BSI-DSZ-CC-0913-2014",
          "BSI-DSZ-CC-0866-V2-2014",
          "BSI-DSZ-CC-0750-V2-2014",
          "BSI-DSZ-CC-0867-2014",
          "NSCIB-CC-13-37760-CR2",
          "BSI-DSZ-CC-0911-2014"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0645-2010"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0866-V2-2014",
          "OCSI/CERT/CCL/05/2021/RC",
          "NSCIB-CC-13-37760-CR2",
          "BSI-DSZ-CC-0750-V2-2014",
          "OCSI/CERT/SYS/06/2016/RC",
          "OCSI/CERT/SYS/03/2016/RC",
          "OCSI/CERT/SYS/04/2015/RC",
          "OCSI/CERT/SYS/02/2016/RC",
          "OCSI/CERT/SYS/05/2016/RC",
          "BSI-DSZ-CC-0866-2013",
          "BSI-DSZ-CC-0911-2014",
          "OCSI/CERT/CCL/09/2022/RC",
          "BSI-DSZ-CC-0914-2014",
          "OCSI/CERT/SYS/05/2015/RC",
          "BSI-DSZ-CC-0858-V2-2015",
          "BSI-DSZ-CC-0912-2014",
          "BSI-DSZ-CC-0913-2014",
          "OCSI/CERT/CCL/06/2021/RC",
          "BSI-DSZ-CC-0867-2014"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0645-2010"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0914-2014",
          "BSI-DSZ-CC-0912-2014",
          "BSI-DSZ-CC-0913-2014",
          "BSI-DSZ-CC-0866-V2-2014",
          "BSI-DSZ-CC-0867-2014",
          "BSI-DSZ-CC-0866-2013",
          "BSI-DSZ-CC-0911-2014"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0914-2014",
          "BSI-DSZ-CC-0912-2014",
          "BSI-DSZ-CC-0913-2014",
          "BSI-DSZ-CC-0866-V2-2014",
          "BSI-DSZ-CC-0867-2014",
          "BSI-DSZ-CC-0866-2013",
          "BSI-DSZ-CC-0911-2014"
        ]
      },
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH Business Line Identification",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2013-06-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0858a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0858-2013",
        "cert_item": "NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software",
        "cert_lab": "BSI",
        "developer": "NXP Semiconductors Germany GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0645-2010": 3,
          "BSI-DSZ-CC-0858": 1,
          "BSI-DSZ-CC-0858-2013": 23
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 4
        },
        "R": {
          "R.O": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 2,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 2,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 7,
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 3,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 2,
          "ATE_DPT.4": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 1,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 3,
          "EAL 5": 7,
          "EAL 5 augmented": 3,
          "EAL1": 7,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 7,
          "EAL5": 7,
          "EAL5+": 1,
          "EAL6": 4,
          "EAL7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Business Unit Identification, Rev. 2.0, April 26th, 2013 (confidential document) 8 specifically \u2022 AIS 25, Version 7, Anwendung der CC auf Integrierte Schaltungen including JIL": 1,
          "P5Cx128/P5Cx145 V0v/ V0B(s) Security Target, NXP Semiconductors, Business Unit Identification (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8": 1,
          "Report, Version 1.5, 10 May 2013, Evaluation Technical Report BSI-DSZ-CC-0858, T-Systems GEI GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36, Version 1.0, 22 April 2013, ETR for": 1,
          "according to AIS36 as summary of the Evaluation Technical Report, T-Systems GEI GmbH (confidential document) [11] Configuration lists for the TOE: \u2022 Configuration List P5Cx128/P5Cx145 V0v/ V0B(s), NXP": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 4
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        },
        "SCA": {
          "physical probing": 1,
          "side channel": 2
        },
        "other": {
          "JIL": 4,
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 25": 3,
          "AIS 26": 1,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 3,
          "AIS 37": 1,
          "AIS 38": 1,
          "AIS36": 1
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 18092": 2,
          "ISO/IEC 7816": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "DES": {
          "3DES": {
            "Triple-DES": 5
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 21,
          "NXP Semiconductors": 29
        },
        "Philips": {
          "Philips": 5
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20130625154417+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smartcard\"",
      "/ModDate": "D:20130625154905+02\u002700\u0027",
      "/Producer": "LibreOffice 3.6",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0858-2013",
      "pdf_file_size_bytes": 1023773,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierung"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 40
    },
    "st_filename": "0858b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0858": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.HW_AES": 7,
          "O.MEM_ACCESS": 9,
          "O.MF_FW": 7,
          "O.RND": 3,
          "O.SFR_ACCESS": 7
        },
        "T": {
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0035": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 4,
          "ADV_FSP.4": 3,
          "ADV_FSP.5": 11,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 1,
          "ALC_CMS": 4,
          "ALC_CMS.4": 3,
          "ALC_CMS.5": 5,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 2,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.2": 5
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 3,
          "EAL 5 augmented": 1,
          "EAL4": 3,
          "EAL4 augmented": 1,
          "EAL4+": 1,
          "EAL5": 32,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 5,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 5,
          "FCS_CKM.4": 3,
          "FCS_COP.1": 22,
          "FCS_COP.1.1": 2,
          "FCS_RNG.1": 4,
          "FCS_RNG.1.1": 3,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC.1": 33,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 30,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 10,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 5,
          "FDP_ITT.1": 6
        },
        "FMT": {
          "FMT_LIM.1": 3,
          "FMT_LIM.2": 3,
          "FMT_MSA.1": 25,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 18,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_SMF.1": 14,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 7
        },
        "FPT": {
          "FPT_FLS.1": 7,
          "FPT_ITT.1": 6,
          "FPT_PHP.3": 7
        },
        "FRU": {
          "FRU_FLT.2": 7
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 5,
          "RNG": 7
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 10,
          "fault injection": 5,
          "malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 13,
          "Physical Probing": 2,
          "physical probing": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 2,
          "CCMB-2009-07-003": 2,
          "CCMB-2009-07-004": 2
        },
        "FIPS": {
          "FIPS PUB 197": 3,
          "FIPS PUB 46": 1,
          "FIPS PUB 46-3": 3
        },
        "ISO": {
          "ISO/IEC 14443": 14,
          "ISO/IEC 18092": 2,
          "ISO/IEC 7816": 10
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 33
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 3,
            "Triple-DEA": 1,
            "Triple-DES": 9
          },
          "DES": {
            "DEA": 2,
            "DES": 26
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 1": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 100,
          "NXP Semiconductors": 28
        },
        "Philips": {
          "Philips": 3
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP Semiconductors",
      "/CreationDate": "D:20121119165646+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 9.1 for Word",
      "/Keywords": "CC; Security Evaluation; Security Target Lite; Functional Requirements; Security Functionality; Assurance Level; P5Cx128/P5Cx145 V0v/ V0B(s); P5CD145; P5CD128; P5CC145; P5CC128; P5CN145; MIFARE MSO; MIFARE FleX\u2122",
      "/ModDate": "D:20121119170042+01\u002700\u0027",
      "/Producer": "Adobe PDF Library 9.0",
      "/Subject": "Security Target Lite",
      "/Title": "Security Target Lite  P5Cx128/P5Cx145 V0v/ V0B(s)",
      "pdf_file_size_bytes": 616053,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]\u0000",
          "https://extranet.nxp.com/\u0000",
          "http://www.nxp.com/\u0000"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 74
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "SECURITY_IC_V1.0",
            "PKISKPP"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf",
        "pp_name": "Security IC Platform Protection Profile, Version 1.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0858a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "ASE_TSS.2",
      "AVA_VAN.5",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0858b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "99e6b557d620ed143d22afe30e4ad1f0b55f59a7ee517d4c31c5e4d09c066bff",
      "txt_hash": "04e76fef73e5028f83a7114739c8986cdb1f6c30431c26830a2a879ba0826cf8"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "868c46d5480c8d382b99ed2f470e81e784b55b9b816da74bfec56935abf8169a",
      "txt_hash": "89ff57616b0513e1fbe5e60030a3cd377869be74753465903fc713368cf95ade"
    }
  },
  "status": "archived"
}