This page was not yet optimized for use on mobile
devices.
NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1
CSV information
| Status | archived |
|---|---|
| Valid from | 24.10.2014 |
| Valid until | 25.10.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | NXP Semiconductors Germany GmbH Business Line Identification |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VAN.5, EAL5+, ASE_TSS.2, ALC_DVS.2 |
| Protection profiles | |
| Maintenance updates | NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 (15.06.2015) Certification report |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0897-V2-2014
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDES, CMACSchemes
MAC, Key AgreementRandomness
RNGEngines
SmartMX2Block cipher modes
CBCVendor
NXP, NXP SemiconductorsSecurity level
EAL 5, EAL 4, EAL1, EAL4, EAL 2, EAL5, EAL5+, EAL6, EAL2, EAL3, EAL7, EAL 5 augmented, ITSEC EvaluationClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMS.5, ALC_TAT.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_DPT.3, ATE_COV.2, ATE_COV.1, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_TSS.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FTP_TRP.1Protection profiles
BSI-CC-PP-0035-2007Certificates
BSI-DSZ-CC-0897-V2-2014, BSI-DSZ-CC-0897-2013Evaluation facilities
TÜV InformationstechnikSide-channel analysis
physical probing, fault injection, JILCertification process
NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG Security Target, NXP Semiconductors (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8, 17 October 2014, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36, Version 3, 17 October 2014, ETR FOR, EVALUATION (ETR-COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration lists for the TOE: 8 specifically • AIS 25, Version 8, Anwendung der CC auf, Configuration List, Version 01.50, 23 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and • NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG, Customer specific Appendix of, Configuration List, Version 01.40, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and • NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG, Appendix of the Configuration, evaluation, Version 01.40, 05 August 2014, NXP Semiconductors, Business Unit Identification (confidential document) and • NXP Secure Smart Card Controller P60D080/052/040MVC(Z/A)/MVG, Firmware Configuration List, 1.0, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and • NXP Secure Smart Card Controller P60D080/052/040JVC(Z/A)/JVG, Firmware Configuration List, 1.1, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) [12] Guidance documentation for the TOE: • NXP Secure Smart Card Controller P60x040/052/080 VC/VG, and Operation Manual, Version 1.1, 26 June 2014, NXP Semiconductors, Business Unit Identification (confidential document) and • NXP Secure Smart Card Controller P60xeeey, MIFARE DESFire EV1 Guidance, Delivery and, User Guidance Manual, Version 1.3, 10 June 2013, NXP Semiconductors, Business Unit Identification (confidential document) and • NXP Secure Smart Card Controller P60xeeey, MIFARE Plus MF1PLUSx0 Guidance, Delivery and, User Guidance Manual, Version 1.5, 21 June 2013, NXP Semiconductors, Business Unit Identification (confidential document) 25 / 38 Certification Report BSI-DSZ-CC-0897-V2-2014 This page is intentionally left blank. 26Standards
SP 800-38A, AIS 34, AIS 25, AIS 26, AIS 37, AIS 31, AIS 36, AIS 35, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7138, BSI 7125, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0897-V2-2014 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, Smartcard" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20141111080640+01'00' |
| Modification date | D:20141111084240+01'00' |
| Pages | 38 |
| Creator | Writer |
| Producer | LibreOffice 4.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0897-V2-2014 |
|---|---|
| Certified item | NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 |
| Certification lab | BSI |
| Developer | NXP Semiconductors Germany GmbH |
References
Outgoing- BSI-DSZ-CC-0897-2013 - archived - NXP Secure Smart Card Controller P60D080/052/040yVC including IC Dedicated Software with MIFARE Plus MF1PLUSx0 or with MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1
- NSCIB-CC-13-37581-CR2 - archived - Crypto Library V1.0 on P60x080/052/040yVC(Z/A)/yVG
- ANSSI-CC-2015/74 - archived - NXP JAVA OS1 ChipDoc v1.0 ICAO BAC with optional AA on NXP P60D080JVC
- ANSSI-CC-2015/75 - archived - NXP JAVA OS1 ChipDoc v1.0 ICAO EAC-SAC with optional AA on P60D080JVC
- ANSSI-CC-2015/44 - archived - NXP JAVA OS1 ChipDoc v1.0 SSCD (J3K080/J2K080)
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, DEA, Triple-DES, CMACAsymmetric Algorithms
ECCSchemes
MACRandomness
TRNG, RND, RNGEngines
SmartMX2Block cipher modes
CBCVendor
NXP, NXP SemiconductorsSecurity level
EAL5, EAL4, EAL5+, EAL4+, EAL5 augmented, EAL4 augmentedClaims
O.RND, O.INTEGRITY_CHK, O.HW_AES, O.CUST_RECONFIG, O.EEPROM_INTEGRITY, O.FM_FW, O.MEM_ACCESS, O.SFR_ACCESS, O.ACCESS-CONTROL, O.AUTHENTICATION, O.ENCRYPTION, O.MAC, O.TYPE-CONSISTENCY, O.DF-TRANSACTION, O.TYPE-, O.ACCESS-, O.DF-, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_ARC, ADV_FSP, ADV_IMP, ADV_FSP.4, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMS.4, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_TSS, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FDP_ITT, FDP_ITT.5, FDP_ITT.1, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ROL.1, FDP_ROL.1.1, FDP_ROL.1.2, FIA_UID.1, FIA_UID.2, FIA_UAU.2, FIA_UAU.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_ITT.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RPL.1, FPT_RPL.1.1, FPT_RPL.1.2, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_ROL.1Protection profiles
BSI-PP-0035Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injectionStandards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 46, AIS20, AIS31, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 18092, CCMB-2012-09-001, CCMB-2012-09-004File metadata
| Title | Security Target Lite |
|---|---|
| Subject | NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG |
| Author | NXP Semiconductors |
| Creation date | D:20140821153253+02'00' |
| Modification date | D:20140821154636+02'00' |
| Pages | 131 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
References
Incoming- ANSSI-CC-2017/43 - archived - ChipDoc P60 on JCOP 3 SECID P60 (OSAà SSCD chargé sur composant P6022J VB, Version v7b1
- ANSSI-CC-2017/35 - archived - ChipDoc P60 on JCOP 3 SECID P60 (OSA) ICAO EAC avec AA, CA et PACE masqué sur composant P6022J VB
- ANSSI-CC-2015/74 - archived - NXP JAVA OS1 ChipDoc v1.0 ICAO BAC with optional AA on NXP P60D080JVC
- ANSSI-CC-2017/64 - archived - ChipDoc P60 on JCOP 3 SECID P60 (OSB) SSCD masqué sur composant P6022J VB
- ANSSI-CC-2015/75 - archived - NXP JAVA OS1 ChipDoc v1.0 ICAO EAC-SAC with optional AA on P60D080JVC
- ANSSI-CC-2017/34 - archived - ChipDoc P60 on JCOP 3 SECID P60 (OSA) ICAO BAC avec AA et CA masqué sur composant P6022J VB
- ANSSI-CC-2017/62 - archived - ChipDoc P60 on JCOP 3 SECID P60 (OSB) ICAO BAC avec AA et CA masqué sur composant P6022J VB (version v7b4)
- ANSSI-CC-2015/44 - archived - NXP JAVA OS1 ChipDoc v1.0 SSCD (J3K080/J2K080)
- ANSSI-CC-2017/63 - archived - ChipDoc P60 on JCOP 3 SECID P60 (OSB) ICAO EAC avec AA, CA et PACE masqué sur composant P6022J VB (version v7b4)
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0897-V2-2014Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_SPM.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.3, ALC_LCD.1, ALC_TAT.2, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
Showing 5 out of 80.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "251e3bc59dacdd82",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0897-V2-2014",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"052"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"f6d23054061d72ba"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-13-37581-CR2",
"ANSSI-CC-2015/74",
"ANSSI-CC-2015/44",
"ANSSI-CC-2015/75"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0897-2013"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-13-37581-CR2",
"ANSSI-CC-2015/74",
"ANSSI-CC-2015/44",
"ANSSI-CC-2015/75"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0897-2013"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/64",
"ANSSI-CC-2017/63",
"ANSSI-CC-2017/35",
"ANSSI-CC-2015/44",
"ANSSI-CC-2017/43",
"ANSSI-CC-2015/74",
"ANSSI-CC-2017/34",
"ANSSI-CC-2017/62",
"ANSSI-CC-2015/75"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/64",
"ANSSI-CC-2017/63",
"ANSSI-CC-2017/35",
"ANSSI-CC-2015/44",
"ANSSI-CC-2017/43",
"ANSSI-CC-2015/74",
"ANSSI-CC-2017/34",
"ANSSI-CC-2017/62",
"ANSSI-CC-2015/75"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2015-06-15",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0897V2ma1a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1"
}
]
},
"manufacturer": "NXP Semiconductors Germany GmbH Business Line Identification",
"manufacturer_web": "https://www.nxp.com",
"name": "NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1",
"not_valid_after": "2019-10-25",
"not_valid_before": "2014-10-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0897V2a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2, ASE_TSS.2 and AVA_VAN.5 SOGIS Recognition Agreement",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0897-V2-2014",
"cert_item": "NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1",
"cert_lab": "BSI",
"developer": "NXP Semiconductors Germany GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0897-2013": 3,
"BSI-DSZ-CC-0897-V2-2014": 22
}
},
"cc_claims": {
"O": {
"O.C": 6
},
"R": {
"R.O": 6
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 2,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 7,
"ALC_FLR": 3,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 3,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 6
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 2,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 3,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 4,
"EAL 5": 7,
"EAL 5 augmented": 3,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 6,
"EAL5": 7,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FTP": {
"FTP_TRP.1": 2
}
},
"certification_process": {
"ConfidentialDocument": {
"1.0, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and \u2022 NXP Secure Smart Card Controller P60D080/052/040JVC(Z/A)/JVG, Firmware Configuration List": 1,
"1.1, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) [12] Guidance documentation for the TOE: \u2022 NXP Secure Smart Card Controller P60x040/052/080 VC/VG": 1,
"17 October 2014, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), T\u00dcV Informationstechnik GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36, Version 3, 17 October 2014, ETR FOR": 1,
"Configuration List, Version 01.40, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and \u2022 NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG, Appendix of the Configuration": 1,
"Configuration List, Version 01.50, 23 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and \u2022 NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG, Customer specific Appendix of": 1,
"EVALUATION (ETR-COMP), T\u00dcV Informationstechnik GmbH (confidential document) [11] Configuration lists for the TOE: 8 specifically \u2022 AIS 25, Version 8, Anwendung der CC auf": 1,
"NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG Security Target, NXP Semiconductors (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8": 1,
"User Guidance Manual, Version 1.3, 10 June 2013, NXP Semiconductors, Business Unit Identification (confidential document) and \u2022 NXP Secure Smart Card Controller P60xeeey, MIFARE Plus MF1PLUSx0 Guidance, Delivery and": 1,
"User Guidance Manual, Version 1.5, 21 June 2013, NXP Semiconductors, Business Unit Identification (confidential document) 25 / 38 Certification Report BSI-DSZ-CC-0897-V2-2014 This page is intentionally left blank. 26 ": 1,
"and Operation Manual, Version 1.1, 26 June 2014, NXP Semiconductors, Business Unit Identification (confidential document) and \u2022 NXP Secure Smart Card Controller P60xeeey, MIFARE DESFire EV1 Guidance, Delivery and": 1,
"evaluation, Version 01.40, 05 August 2014, NXP Semiconductors, Business Unit Identification (confidential document) and \u2022 NXP Secure Smart Card Controller P60D080/052/040MVC(Z/A)/MVG, Firmware Configuration List": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 11
}
},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX2": 6
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1
},
"SCA": {
"physical probing": 1
},
"other": {
"JIL": 3
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 2,
"AIS 37": 1,
"AIS 38": 1
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"NIST": {
"SP 800-38A": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 17
}
},
"DES": {
"3DES": {
"TDES": 4,
"Triple-DES": 2
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"CMAC": 5
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7138": 2,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 25,
"NXP Semiconductors": 31
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20141111080640+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smartcard\"",
"/ModDate": "D:20141111084240+01\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0897-V2-2014",
"pdf_file_size_bytes": 771555,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "0897V2b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.ACCESS-": 1,
"O.ACCESS-CONTROL": 8,
"O.AUTHENTICATION": 6,
"O.CUST_RECONFIG": 5,
"O.DF-": 2,
"O.DF-TRANSACTION": 4,
"O.EEPROM_INTEGRITY": 5,
"O.ENCRYPTION": 6,
"O.FM_FW": 9,
"O.HW_AES": 7,
"O.INTEGRITY_CHK": 6,
"O.MAC": 5,
"O.MEM_ACCESS": 9,
"O.RND": 3,
"O.SFR_ACCESS": 9,
"O.TYPE-": 2,
"O.TYPE-CONSISTENCY": 3
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 4,
"ADV_FSP.4": 3,
"ADV_FSP.5": 11,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 1,
"ALC_CMS": 4,
"ALC_CMS.4": 3,
"ALC_CMS.5": 5,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.2": 5
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL4 augmented": 1,
"EAL4+": 3,
"EAL5": 34,
"EAL5 augmented": 1,
"EAL5+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 8,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 15,
"FCS_CKM.4": 22,
"FCS_CKM.4.1": 2,
"FCS_COP.1": 57,
"FCS_COP.1.1": 5,
"FCS_RNG.1": 10,
"FCS_RNG.1.1": 3,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC.1": 70,
"FDP_ACC.1.1": 4,
"FDP_ACF.1": 52,
"FDP_ACF.1.1": 4,
"FDP_ACF.1.2": 4,
"FDP_ACF.1.3": 4,
"FDP_ACF.1.4": 4,
"FDP_IFC.1": 21,
"FDP_ITC.1": 15,
"FDP_ITC.2": 33,
"FDP_ITC.2.1": 2,
"FDP_ITC.2.2": 2,
"FDP_ITC.2.3": 2,
"FDP_ITC.2.4": 2,
"FDP_ITC.2.5": 2,
"FDP_ITT": 1,
"FDP_ITT.1": 7,
"FDP_ITT.5": 13,
"FDP_ROL.1": 6,
"FDP_ROL.1.1": 1,
"FDP_ROL.1.2": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 8,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_UAU.1": 2,
"FIA_UAU.2": 13,
"FIA_UAU.5": 11,
"FIA_UAU.5.1": 2,
"FIA_UAU.5.2": 2,
"FIA_UID.1": 10,
"FIA_UID.2": 15
},
"FMT": {
"FMT_LIM.1": 4,
"FMT_LIM.2": 4,
"FMT_MSA.1": 47,
"FMT_MSA.1.1": 4,
"FMT_MSA.3": 42,
"FMT_MSA.3.1": 4,
"FMT_MSA.3.2": 4,
"FMT_SMF.1": 34,
"FMT_SMF.1.1": 3,
"FMT_SMR.1": 32,
"FMT_SMR.1.1": 2,
"FMT_SMR.1.2": 2
},
"FPT": {
"FPT_FLS.1": 8,
"FPT_ITT.1": 16,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 8,
"FPT_RPL.1": 14,
"FPT_RPL.1.1": 2,
"FPT_RPL.1.2": 2,
"FPT_TDC.1": 17,
"FPT_TDC.1.1": 2,
"FPT_TDC.1.2": 2
},
"FRU": {
"FRU_FLT.2": 8
},
"FTP": {
"FTP_ITC.1": 4,
"FTP_ROL.1": 1,
"FTP_TRP.1": 24,
"FTP_TRP.1.1": 2,
"FTP_TRP.1.2": 2,
"FTP_TRP.1.3": 7
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 7
}
},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX2": 16
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 17
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 17
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 13,
"fault injection": 3,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 13,
"Physical Probing": 2,
"physical probing": 1,
"side channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS20": 2,
"AIS31": 3
},
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-004": 2
},
"FIPS": {
"FIPS PUB 197": 5,
"FIPS PUB 46": 1,
"FIPS PUB 46-3": 5
},
"ISO": {
"ISO/IEC 14443": 18,
"ISO/IEC 18092": 2,
"ISO/IEC 7816": 22
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 67
}
},
"DES": {
"3DES": {
"Triple-DES": 31
},
"DES": {
"DEA": 1,
"DES": 9
}
},
"constructions": {
"MAC": {
"CMAC": 9
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 170,
"NXP Semiconductors": 42
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "NXP Semiconductors",
"/CreationDate": "D:20140821153253+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20140821154636+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG",
"/Title": "Security Target Lite",
"pdf_file_size_bytes": 1560771,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.nxp.com/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 131
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0897V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"AVA_VAN.5",
"ALC_DVS.2",
"ASE_TSS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0897V2b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f55b375855b655c169c08d2751a631f9f4bcd988981adcabc0c99638826809d7",
"txt_hash": "857652a89c9a961911251c4c7325cba986bc814a2ccb320f78dd15c8f5ea40b5"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "81ea7c8677a611bde47882410682e8fa0a25c035b26fb49213bdf1aed26e0ea9",
"txt_hash": "0527d4466829792c1ad9308a16a022d71b5cefbd77b27254d960ea8cf0af2f97"
}
},
"status": "archived"
}