NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software

CSV information ?

Status archived
Valid from 05.02.2016
Valid until 05.02.2021
Scheme 🇩🇪 DE
Manufacturer NXP Semiconductors Germany GmbH Business Line Identification
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_FLR.1, ASE_TSS.2, EAL6+
Protection profiles
Maintenance updates NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software (17.08.2018) Certification report

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0978-2016

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES
Randomness
TRNG, RNG
Engines
SmartMX2

Vendor
NXP, NXP Semiconductors

Security level
EAL 6, EAL 5, EAL 2, EAL 1, EAL 4, EAL5, EAL 5+, EAL 3, EAL 7, EAL 6 augmented, ITSEC Evaluation
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_INT.1, ADV_INT.2, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DVS.2, ALC_TAT.3, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_FUN, ATE_IND, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, AVA_VAN.5, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_TSS.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0035-2007
Certificates
BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0978
Evaluation facilities
TÃœV Informationstechnik, TÃœViT
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, NXP Semiconductors, Version 2.61, 14 October 2015 (confidential document) [7] Evaluation Technical Report, NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, IC Dedicated Software, TÃœV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [9, Certification Report Software, TÃœV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [11] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Configuration List,NXP, Version 2.7, 25 September 2015 (confidential document) [12] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Evaluation Reference List, NXP, Version 1.4, 11 September 2015 (confidential document) [13] Product data sheet SmartMX2 family P60x080/144 VA/VE, Secure high-performance smart card, NXP Semiconductors Document Number 1658**, NXP Semiconductors, Version 5.4, 14 August 2015 (confidential document) [14] Instruction Set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors, Number 1478**, NXP Semiconductors, Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60x080/144P VA/VE, Semiconductors, NXP Semiconductors, Version 2.7, 12 November 2015 (confidential document) [16] Product data sheet addendum: SmartMX2 family P60D080/144 VA/VE and P60C080/144 VA/VE, NXP Semiconductors, Document Number 1569**, NXP Semiconductors, Version 3.7, 21 May 2014 (confidential document) [17] Product data sheet addendum: SmartMX2 family Post Delivery Configuration (PDC), NXP, Document Number 2250** ,NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors, Number 2244**, NXP Semiconductors, Version 3.1, 01 October 2014 (confidential document) [19] Product data sheet addendum: SmartMX2 family Firmware Interface Specification (FIS), NXP, Document Number 2333**, NXP Semiconductors, Version 4.2, 24 June 2015 (confidential document) [20] Product data sheet SmartMX2 family P60N144 VA, Secure high-performance smart card controller, Semiconductors, Document Number 2408**, NXP Semiconductors, Version 3.2, 14 August 2014 (confidential document) [21] Product data sheet addendum: SmartMX2 family P60N144 VA/VE, Wafer and delivery specification, Semiconductors, Document Number 2414**, NXP Semiconductors, Version 3.2, 06 June 2015 (confidential document) [22] Order Entry Form, P60C144, NXP Semiconductors, Version 3.2, 06 October 2015 [23] Order Entry

Side-channel analysis
SPA, DPA, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, NXP Semiconductors, Version 2.61, 14 October 2015 (confidential document) [7] Evaluation Technical Report, NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, IC Dedicated Software, TÃœV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [9, Certification Report Software, TÃœV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [11] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Configuration List,NXP, Version 2.7, 25 September 2015 (confidential document) [12] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Evaluation Reference List, NXP, Version 1.4, 11 September 2015 (confidential document) [13] Product data sheet SmartMX2 family P60x080/144 VA/VE, Secure high-performance smart card, NXP Semiconductors Document Number 1658**, NXP Semiconductors, Version 5.4, 14 August 2015 (confidential document) [14] Instruction Set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors, Number 1478**, NXP Semiconductors, Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60x080/144P VA/VE, Semiconductors, NXP Semiconductors, Version 2.7, 12 November 2015 (confidential document) [16] Product data sheet addendum: SmartMX2 family P60D080/144 VA/VE and P60C080/144 VA/VE, NXP Semiconductors, Document Number 1569**, NXP Semiconductors, Version 3.7, 21 May 2014 (confidential document) [17] Product data sheet addendum: SmartMX2 family Post Delivery Configuration (PDC), NXP, Document Number 2250** ,NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors, Number 2244**, NXP Semiconductors, Version 3.1, 01 October 2014 (confidential document) [19] Product data sheet addendum: SmartMX2 family Firmware Interface Specification (FIS), NXP, Document Number 2333**, NXP Semiconductors, Version 4.2, 24 June 2015 (confidential document) [20] Product data sheet SmartMX2 family P60N144 VA, Secure high-performance smart card controller, Semiconductors, Document Number 2408**, NXP Semiconductors, Version 3.2, 14 August 2014 (confidential document) [21] Product data sheet addendum: SmartMX2 family P60N144 VA/VE, Wafer and delivery specification, Semiconductors, Document Number 2414**, NXP Semiconductors, Version 3.2, 06 June 2015 (confidential document) [22] Order Entry Form, P60C144, NXP Semiconductors, Version 3.2, 06 October 2015 [23] Order Entry

Standards
AIS 34, AIS 25, AIS 26, AIS 37, AIS 31, AIS 36, AIS31, AIS 35, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 14443, ISO/IEC 7816
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0978-2016
Subject Common Criteria Certification
Keywords "Common Criteria, Certification, Zertifizierung, BSI, P60x144/080yVA/yVA(Y/B/X)y/VE, Secure Smart Card Controller, EAL6, NXP"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20160223160422+01'00'
Modification date D:20160224080500+01'00'
Pages 42
Creator Writer
Producer LibreOffice 4.2

Frontpage

Certificate ID BSI-DSZ-CC-0978-2016
Certified item NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software
Certification lab BSI
Developer NXP Semiconductors Germany GmbH

References

Incoming
  • ANSSI-CC-2016/28 - archived - ID-One eIDAS v1.0 en configuration SSCD-4 sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/29 - archived - ID-One eIDAS v1.0 en configuration SSCD-5 sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/26 - archived - ID-One eIDAS v1.0 en configuration SSCD-2 sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/49 - archived - ID-One eIDL v1.0 en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x144PVA/PVE
  • BSI-DSZ-CC-0817-V2-2016 - archived - TCOS Identity Card Version 1.1 Release 2/P60D144
  • ANSSI-CC-2016/39 - archived - ID-One ePass Full EAC v2 MRTD en configuration EAC et PACE avec AA masqué sur les composants P60x144PVA/PVE
  • BSI-DSZ-CC-0978-V2-2017 - archived - NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software
  • ANSSI-CC-2016/52 - archived - ID-One eIDL v1.0 en configuration BAP avec AA et CA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/38 - archived - ID-One ePass Full EAC v2 MRTD en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/27 - archived - ID-One eIDAS v1.0 en configuration SSCD-3 sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/41 - archived - ID-One ePass Full EAC v2 MRTD en configuration BAC avec AA et CA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/30 - archived - ID-One eIDAS v1.0 en configuration SSCD-6 sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/40 - archived - ID-One ePass Full EAC v2 MRTD en configuration EAC avec AA masqué sur les composants P60x144PVA/PVE
  • BSI-DSZ-CC-0957-V2-2016 - active - TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA
  • BSI-DSZ-CC-0808-V2-2016 - archived - TCOS Passport Version 2.1 Release 2/P60D144
  • ANSSI-CC-2016/50 - archived - ID-One eIDL v1.0 en configuration EAC et PACE avec AA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/51 - archived - ID-One eIDL v1.0 en configuration EAC avec BAP et AA masqué sur les composants P60x144PVA/PVE
  • BSI-DSZ-CC-0809-V2-2016 - archived - TCOS Passport Version 2.1 Release 2-BAC/ P60D144

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEA, Triple-DEA
Asymmetric Algorithms
ECC
Randomness
TRNG, RND, RNG
Engines
SmartMX2, SmartMX

Vendor
NXP, NXP Semiconductors

Security level
EAL6, EAL4, EAL6+, EAL4+, EAL 6, EAL6 augmented, EAL4 augmented
Claims
O.RND, O.HW_AES, O.CUST_RECONFIG, O.EEPROM_INTEGRITY, O.FM_FW, O.MEM_ACCESS, O.SFR_ACCESS, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, ADV_ARC, ADV_FSP, ADV_IMP, ADV_FSP.4, ADV_SPM, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMS.4, ALC_CMC.4, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ITT.1, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_FLS.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2
Protection profiles
BSI-PP-0035
Certificates
BSI-DSZ-CC-0978

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injection

Standards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 46, AIS31, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 18092, CCMB-2012-09-001, CCMB-2012-09-004

File metadata

Title Security Target Lite
Subject P60x144/080yVA/yVA(Y/B/X)/yVE
Keywords CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144yVA, P60D080yVA, P60D144yVE, P60D080yVE
Author NXP Semiconductors
Creation date D:20151210161030+01'00'
Modification date D:20151210161132+01'00'
Pages 87
Creator Acrobat PDFMaker 11 für Word
Producer Adobe PDF Library 11.0

References

Incoming
  • ANSSI-CC-2016/49 - archived - ID-One eIDL v1.0 en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/39 - archived - ID-One ePass Full EAC v2 MRTD en configuration EAC et PACE avec AA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/52 - archived - ID-One eIDL v1.0 en configuration BAP avec AA et CA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/38 - archived - ID-One ePass Full EAC v2 MRTD en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/41 - archived - ID-One ePass Full EAC v2 MRTD en configuration BAC avec AA et CA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/40 - archived - ID-One ePass Full EAC v2 MRTD en configuration EAC avec AA masqué sur les composants P60x144PVA/PVE
  • BSI-DSZ-CC-0957-V2-2016 - active - TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA
  • ANSSI-CC-2016/50 - archived - ID-One eIDL v1.0 en configuration EAC et PACE avec AA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/51 - archived - ID-One eIDL v1.0 en configuration EAC avec BAP et AA masqué sur les composants P60x144PVA/PVE

Heuristics ?

Certificate ID: BSI-DSZ-CC-0978-2016

Extracted SARs

APE_REQ.2, ALC_CMC.5, ALC_DVS.2, ATE_FUN.2, ALC_FLR.1, APE_SPD.1, ATE_DPT.3, ASE_CCL.1, ALC_LCD.1, ALC_CMS.5, ATE_COV.3, AGD_OPE.1, ALC_TAT.3, ADV_INT.3, ASE_OBJ.2, ADV_FSP.5, ALC_DEL.1, ATE_IND.2, APE_OBJ.2, ADV_IMP.2, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, APE_ECD.1, ADV_SPM.1, AVA_VAN.5, ASE_ECD.1, ADV_TDS.5, ASE_TSS.2, APE_CCL.1, ASE_SPD.1, APE_INT.1

Similar certificates

Name Certificate ID
NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software BSI-DSZ-CC-0978-V2-2017 Compare
NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software BSI-DSZ-CC-0978-V3-2019 Compare
NXP Secure Smart Card Controller P60x144/080PVA/PVA(Y) with IC Dedicated Software FW5.0 BSI-DSZ-CC-0845-V2-2013 Compare
NXP Secure Smart Card Controller P60x144/080yVA including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 BSI-DSZ-CC-0870-2014 Compare
NXP Secure Smart Card Controller P60x144/080PVA with IC Dedicated Software FW5.0 BSI-DSZ-CC-0845-2012 Compare
NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software BSI-DSZ-CC-0810-V2-2014 Compare
NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)PVG with IC Dedicated Software BSI-DSZ-CC-0837-V2-2014 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software BSI-DSZ-CC-0939-V3-2018 Compare
NXP Secure Smart Card Controller P60D024/016/012PVB(Y/Z/A)/PVF with IC Dedicated Software BSI-DSZ-CC-0939-2015 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software BSI-DSZ-CC-0939-V2-2016 Compare
NXP Secure Smart Card Controller P60x080/052/040yVC(Y/Z/A)/yVG with IC Dedicated Software BSI-DSZ-CC-0837-V3-2016 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB/yVB(Y) including IC Dedicated Software with MIFARE Plus MF1PLUSx0 or MIFARE DESFire EV1 BSI-DSZ-CC-0830-V2-2014 Compare
NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0973-V2-2016 Compare
NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0973-2016 Compare
NXP Secure Smart Card Controller MF3F60x1 with IC Dedicated Support Software BSI-DSZ-CC-0587-2010 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-2018 Compare
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software BSI-DSZ-CC-0977-2017 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V2-2019 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-2018 Compare
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software BSI-DSZ-CC-0977-V2-2019 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V3-2019 Compare
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software BSI-DSZ-CC-0977-V3-2021 Compare
NXP Secure Smart Card Controller P61N1M3PVD/VE including IC Dedicated Software BSI-DSZ-CC-0824-2014 Compare
NXP Secure Smart Card Controller P60D024/016/012PVB with IC Dedicated Software BSI-DSZ-CC-0810-2012 Compare
NXP Secure Smart Card Controllers P5CC008V1A, P5CC012V1A each including IC Dedicated Software BSI-DSZ-CC-0771-2011 Compare
NXP Secure Smart Card Controller P6021y VA including IC Dedicated Software BSI-DSZ-CC-0981-2016 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V4-2021 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V2-2019 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V3-2019 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V4-2021 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library BSI-DSZ-CC-1040-2019 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V5-2022 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V5-2022 Compare
NXP Secure Smart Card Controller P60x017/041PVD including IC Dedicated Software BSI-DSZ-CC-0896-2014 Compare
NXP Secure Smart Card Controller P60x017/041PVE including IC Dedicated Software BSI-DSZ-CC-0954-2015 Compare
NXP P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software BSI-DSZ-CC-0584-2009 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1) BSI-DSZ-CC-1149-2022 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software BSI-DSZ-CC-0410-2007 Compare
NXP Secure Smart Card Controller P5CD144V0B, P5CN144V0B and P5CC144V0B each with specific IC Dedicated Software BSI-DSZ-CC-0411-2007 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B and P5CC073V0B each with specific IC Dedicated Software BSI-DSZ-CC-0680-2010 Compare
NXP Secure Smart Card Controller P5CD040V0B, P5CC040V0B, P5CD020V0B and P5CC021V0B each with specific IC Dedicated Software BSI-DSZ-CC-0404-2007 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CC080V0B, P5CN080V0B, P5CC073V0B each with specific IC Dedicated Software BSI-DSZ-CC-0700-2011 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1136-V2-2022 Compare
NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0 BSI-DSZ-CC-0440-2008 Compare
NXP Secure Smart Card Controller P60D144/080MVA including IC Dedicated Software with MIFARE Plus MF1PLUSx0 BSI-DSZ-CC-0840-2013 Compare
NXP Smart Card Controller P5CC052V0A with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0551-2008 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1149-V2-2023 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1149-V3-2023 Compare
NXP Smart Card Controller P5CC037V0A with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0550-2008 Compare
NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/V1A(s) each including IC Dedicated Software BSI-DSZ-CC-0855-2013 Compare
NXP Smart Card Controller P5CD040V0B with IC dedicated software: Secured Crypto Library Release 2.0 to EAL5+ BSI-DSZ-CC-0439-2008 Compare
NXP Secure Smart Card Controller P60D024/016/012MVB including IC Dedicated Software with MIFARE Plus MF1PLUSx0 BSI-DSZ-CC-0842-2013 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) BSI-DSZ-CC-1136-V4-2024 Compare
NXP Secure Smart Card Controller P60D080/052/040MVC including IC Dedicated Software with MIFARE Plus MF1PLUSx0 BSI-DSZ-CC-0871-2013 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) BSI-DSZ-CC-1136-V3-2022 Compare
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A, P5CC012V0A all with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0549-2008 Compare
NXP Secure Smart Card Controller P5CT072V0N, P5CD072V0N, P5CD036V0N, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software BSI-DSZ-CC-0375-2007 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB including IC Dedicated Software with MIFARE Plus MF1PLUSx0 or MIFARE DESFire EV1 BSI-DSZ-CC-0830-2013 Compare
NXP Secure PKI Smart Card Controllers P5CD145V0A, MSO; P5CC145V0A, MSO; P5CD128V0A, MSO and P5CC128V0A, MSO; each including IC Dedicated Software BSI-DSZ-CC-0645-2010 Compare
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0a and P5CC012V0A each with IC Dedicated Software: Secured Crypto Library Release 2.0 to CC EAL5+ BSI-DSZ-CC-0464-2008 Compare
NXP Secure Smart Card Controller P60D080/052/040yVC including IC Dedicated Software with MIFARE Plus MF1PLUSx0 or with MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 BSI-DSZ-CC-0897-2013 Compare
NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 BSI-DSZ-CC-0897-V2-2014 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software BSI-DSZ-CC-0827-V8-2020 Compare
NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software BSI-DSZ-CC-0858-2013 Compare
NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software BSI-DSZ-CC-0858-V2-2015 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Toolbox, Base, FTL, SCL, HCL, and PSL, and with specific IC dedicated software BSI-DSZ-CC-0827-V7-2018 Compare
Infineon smart card IC (Security Controller) M9900 A21 with specific IC dedicated software BSI-DSZ-CC-0791-2012 Compare
NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6021P VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6021M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0955-V2-2016 Compare
NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6021P VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6021M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0955-2016 Compare
Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software BSI-DSZ-CC-0827-V4-2016 Compare
Infineon Smart Card IC (Security Controller), SLE66CL80P / m1457a14 and SLE66CL81P / m1436a14 with specific IC Dedicated Software BSI-DSZ-CC-0401-2006 Compare
Infineon Smart Card IC (Security Controller) SLE66CL80P/m1457-a14 and SLE66CL81P/m1436-a14 with specific IC Dedicated Software BSI-DSZ-CC-0354-2006 Compare
Infineon Smart Card IC (Security Controller) SLE66CX642P/m1485b16 with RSA 2048 V1.30 and specific IC Dedicated Software BSI-DSZ-CC-0315-2005 Compare
Infineon Smart Card IC (Security Controller) SLE66CLX320P / m1559b19 and SLE66CLX321P / m1359b19 both with RSA2048 V1.3 and specific IC Dedicated Software BSI-DSZ-CC-0337-2005 Compare
Infineon Smart Card IC (Security Controller) SLE66CX322P/m1484b14 and m1484f18 with RSA 2048 V1.30 and specific IC Dedicated Software BSI-DSZ-CC-0266-2005 Compare
Showing 5 out of 75.

References ?

Updates ?

  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PKISKPP', 'SECURITY_IC_V1.0']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'be3fc3fa8851f16aa02445b6d43a0d05dcae3aded916d5ca0ddefc07200624f2', 'txt_hash': '532d223e7b93839f1b0a634a1edcfe27691bb9bbb5e1cfa704437449643cf98a'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '21e2fdbc441003344f6bfb846d02418402eebcf5bf09d26d33adac2a0348fcb3', 'txt_hash': 'e89fa1f8b114250cfe1c97b48bf1d36845b6f05a4f72addb81cb1aec7134b617'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1316475, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 42, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20160223160422+01'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, BSI, P60x144/080yVA/yVA(Y/B/X)y/VE, Secure Smart Card Controller, EAL6, NXP"', '/ModDate': "D:20160224080500+01'00'", '/Producer': 'LibreOffice 4.2', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-0978-2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/', 'http://www.sogisportal.eu/', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierungsreporte']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 878457, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 87, '/Alternative descriptive title': 'Security Target Lite', '/Author': 'NXP Semiconductors', '/CertificationID': 'BSI-DSZ-CC-0978', '/Company': 'NXP Semiconductors GmbH Germany', '/Copyright date': '2015', '/CreationDate': "D:20151210161030+01'00'", '/Creator': 'Acrobat PDFMaker 11 für Word', '/Descriptive title': 'Security Target Lite', '/Division': 'NXP Semiconductors', '/Document identifier': ' ', '/Keywords': 'CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144yVA, P60D080yVA, P60D144yVE, P60D080yVE', '/ModDate': "D:20151210161132+01'00'", '/Modification date': '14 October 2015', '/Producer': 'Adobe PDF Library 11.0', '/Product name title': '<not applicable>', '/Revision': 'Rev. 2.61', '/Security status': '<Security status>', '/SourceModified': 'D:20151210150346', '/Specification status': 'Evaluation documentation PUBLIC', '/Subject': 'P60x144/080yVA/yVA(Y/B/X)/yVE', '/Template date': '29 January 2010', '/Template version': '2.9.0', '/Title': 'Security Target Lite', '/docpath': 'W:\\WORKAREA_01\\data\\id_smx21_lib\\id_smx21\\DOCUMENTS\\project_docu\\Evaluation\\Procedure_P60D144\\ASE', '/list_of_authors': ' ', '/philips_smx_cl_docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\99_prj_mgmt\\Templates\\V2.9.0_R1', '/relBiblioPath': '..\\Bibliography.doc', '/test_sec_row_naming': 'manufacturer area', '/text_cert_body_long': 'Bundesamt fuer Sicherheit in der Informationstechnik', '/text_cert_body_short': 'BSI', '/text_developer_long': 'NXP Semiconductors, Business Unit Security & Connectivity', '/text_developer_short': 'NXP Semiconductors', '/text_product_cfgC080': 'P60C080P', '/text_product_cfgC144': 'P60C144P', '/text_product_cfgD080': 'P60D080y', '/text_product_cfgD144': 'P60D144y', '/text_product_cfgD144_nameplate': '9050C', '/text_product_letter': 'A', '/text_product_long': 'NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE', '/text_product_minor': 'VA/VE', '/text_product_short': 'NXP Secure Smart Card Controller P60x144/080y', '/text_product_short_pa': 'P60x144/080yVA/VE', '/text_product_short_pa_b': 'P60x144/080yVA(B)', '/text_product_short_pa_y': 'P60x144/080yVA(Y)', '/text_product_short_pe': 'P60x144/080yVE', '/text_sponsor_long': 'NXP Semiconductors, Business Unit Security & Connectivity', '/text_sponsor_short': 'NXP', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.nxp.com/', 'mailto:[email protected]']}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0978-2016', 'cert_item': 'NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1 SOGIS Recognition Agreement'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0978-2016': 22, 'BSI-DSZ-CC-0978': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 4}}, 'cc_security_level': {'EAL': {'EAL 6': 8, 'EAL 5': 9, 'EAL 2': 7, 'EAL 1': 7, 'EAL 4': 6, 'EAL5': 1, 'EAL 5+': 1, 'EAL 3': 4, 'EAL 7': 4, 'EAL 6 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_IMP.2': 2, 'ADV_INT.3': 2, 'ADV_SPM.1': 2, 'ADV_TDS.5': 2, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 6, 'ALC_FLR': 3, 'ALC_CMC.5': 3, 'ALC_CMS.5': 3, 'ALC_DVS.2': 3, 'ALC_TAT.3': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 2, 'ATE_FUN.2': 2, 'ATE_FUN': 3, 'ATE_IND': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 3, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_TSS.2': 6, 'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 7}, 'R': {'R.O': 7}}, 'vendor': {'NXP': {'NXP': 36, 'NXP Semiconductors': 53}}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 4, 'TÃœViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 4}, '3DES': {'Triple-DES': 5, 'TDES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 16}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1, 'DPA': 1}, 'other': {'JIL': 3}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 25': 2, 'AIS 26': 2, 'AIS 37': 1, 'AIS 31': 2, 'AIS 36': 3, 'AIS31': 1, 'AIS 35': 2, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2, 'ISO/IEC 14443': 4, 'ISO/IEC 7816': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, NXP Semiconductors, Version 2.61, 14 October 2015 (confidential document) [7] Evaluation Technical Report, NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE': 1, 'IC Dedicated Software, TÃœV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [9': 1, 'Certification Report Software, TÃœV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [11] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Configuration List,NXP': 1, 'Version 2.7, 25 September 2015 (confidential document) [12] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Evaluation Reference List, NXP': 1, 'Version 1.4, 11 September 2015 (confidential document) [13] Product data sheet SmartMX2 family P60x080/144 VA/VE, Secure high-performance smart card': 1, 'NXP Semiconductors Document Number 1658**, NXP Semiconductors, Version 5.4, 14 August 2015 (confidential document) [14] Instruction Set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors': 1, 'Number 1478**, NXP Semiconductors, Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60x080/144P VA/VE': 1, 'Semiconductors, NXP Semiconductors, Version 2.7, 12 November 2015 (confidential document) [16] Product data sheet addendum: SmartMX2 family P60D080/144 VA/VE and P60C080/144 VA/VE': 1, 'NXP Semiconductors, Document Number 1569**, NXP Semiconductors, Version 3.7, 21 May 2014 (confidential document) [17] Product data sheet addendum: SmartMX2 family Post Delivery Configuration (PDC), NXP': 1, 'Document Number 2250** ,NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors': 1, 'Number 2244**, NXP Semiconductors, Version 3.1, 01 October 2014 (confidential document) [19] Product data sheet addendum: SmartMX2 family Firmware Interface Specification (FIS), NXP': 1, 'Document Number 2333**, NXP Semiconductors, Version 4.2, 24 June 2015 (confidential document) [20] Product data sheet SmartMX2 family P60N144 VA, Secure high-performance smart card controller': 1, 'Semiconductors, Document Number 2408**, NXP Semiconductors, Version 3.2, 14 August 2014 (confidential document) [21] Product data sheet addendum: SmartMX2 family P60N144 VA/VE, Wafer and delivery specification': 1, 'Semiconductors, Document Number 2414**, NXP Semiconductors, Version 3.2, 06 June 2015 (confidential document) [22] Order Entry Form, P60C144, NXP Semiconductors, Version 3.2, 06 October 2015 [23] Order Entry': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0978': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL6': 36, 'EAL4': 3, 'EAL6+': 1, 'EAL4+': 1, 'EAL 6': 2, 'EAL6 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 11, 'ADV_IMP.2': 4, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 1, 'ADV_ARC': 1, 'ADV_FSP': 4, 'ADV_IMP': 1, 'ADV_FSP.4': 3, 'ADV_SPM': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 5, 'ALC_CMC.5': 4, 'ALC_CMS.5': 5, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 4, 'ALC_CMC': 4, 'ALC_CMS.4': 3, 'ALC_CMC.4': 3}, 'ATE': {'ATE_COV.3': 4, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 6, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 7, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG.1': 9, 'FCS_RNG.1.1': 3, 'FCS_RNG.1.2': 2, 'FCS_COP.1': 23, 'FCS_COP.1.1': 2, 'FCS_CKM.1': 5, 'FCS_CKM.4': 3}, 'FDP': {'FDP_ITT.1': 6, 'FDP_IFC.1': 10, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5, 'FDP_SDI.2': 7, 'FDP_SDI.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ACC.1': 35, 'FDP_ACC.1.1': 2, 'FDP_ACF.1': 32, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_FLS.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 4, 'FMT_MSA.3': 20, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1': 25, 'FMT_SMR.1': 7, 'FMT_MSA.1.1': 2, 'FMT_SMF.1': 19, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_PHP.3': 7, 'FPT_ITT.1': 6}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3, 'O.HW_AES': 7, 'O.CUST_RECONFIG': 5, 'O.EEPROM_INTEGRITY': 5, 'O.FM_FW': 9, 'O.MEM_ACCESS': 9, 'O.SFR_ACCESS': 9}, 'T': {'T.RND': 2}}, 'vendor': {'NXP': {'NXP': 138, 'NXP Semiconductors': 49}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 32}}, 'DES': {'DES': {'DES': 16, 'DEA': 2}, '3DES': {'Triple-DES': 9, 'TDEA': 3, 'Triple-DEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 14}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 21, 'SmartMX': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 13, 'Physical Probing': 2, 'physical probing': 1, 'side channel': 1, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 10, 'malfunction': 2, 'fault injection': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 197': 3, 'FIPS PUB 46': 1}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 7816': 22, 'ISO/IEC 14443': 16, 'ISO/IEC 18092': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0978a_pdf.pdf.
    • The st_filename property was set to 0978b_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0978-2016.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/52', 'ANSSI-CC-2016/51', 'BSI-DSZ-CC-0957-V2-2016', 'ANSSI-CC-2016/40', 'ANSSI-CC-2016/39', 'ANSSI-CC-2016/49', 'ANSSI-CC-2016/50', 'ANSSI-CC-2016/38', 'ANSSI-CC-2016/41']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/39', 'BSI-DSZ-CC-0822-V5-2023', 'BSI-DSZ-CC-0822-V4-2023', 'ANSSI-CC-2016/40', 'ANSSI-CC-2016/49', 'BSI-DSZ-CC-0918-V5-2023', 'BSI-DSZ-CC-0919-V3-2023', 'BSI-DSZ-CC-0957-V2-2016', 'BSI-DSZ-CC-0918-V3-2022', 'ANSSI-CC-2016/50', 'BSI-DSZ-CC-0918-V2-2021', 'ANSSI-CC-2016/41', 'BSI-DSZ-CC-0918-V4-2022', 'ANSSI-CC-2016/52', 'ANSSI-CC-2016/51', 'BSI-DSZ-CC-0918-2020', 'BSI-DSZ-CC-0919-V2-2021', 'ANSSI-CC-2016/38', 'BSI-DSZ-CC-0918-V6-2024']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/52', 'ANSSI-CC-2016/51', 'BSI-DSZ-CC-0817-V2-2016', 'ANSSI-CC-2016/27', 'BSI-DSZ-CC-0957-V2-2016', 'ANSSI-CC-2016/26', 'ANSSI-CC-2016/39', 'ANSSI-CC-2016/40', 'ANSSI-CC-2016/49', 'ANSSI-CC-2016/50', 'ANSSI-CC-2016/38', 'BSI-DSZ-CC-0978-V2-2017', 'ANSSI-CC-2016/29', 'ANSSI-CC-2016/41', 'ANSSI-CC-2016/28', 'BSI-DSZ-CC-0809-V2-2016', 'ANSSI-CC-2016/30', 'BSI-DSZ-CC-0808-V2-2016']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/39', 'BSI-DSZ-CC-0978-V2-2017', 'BSI-DSZ-CC-0831-V6-2023', 'BSI-DSZ-CC-0809-V3-2017', 'ANSSI-CC-2016/40', 'ANSSI-CC-2016/49', 'BSI-DSZ-CC-0918-V5-2023', 'ANSSI-CC-2016/28', 'BSI-DSZ-CC-0831-V3-2021', 'BSI-DSZ-CC-0809-V2-2016', 'ANSSI-CC-2016/30', 'BSI-DSZ-CC-0919-V3-2023', 'BSI-DSZ-CC-1035-2017', 'BSI-DSZ-CC-0957-V2-2016', 'ANSSI-CC-2016/26', 'ANSSI-CC-2016/50', 'BSI-DSZ-CC-0808-V3-2017', 'ANSSI-CC-2016/29', 'ANSSI-CC-2016/41', 'BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0831-V5-2022', 'BSI-DSZ-CC-0808-V2-2016', 'ANSSI-CC-2016/52', 'ANSSI-CC-2016/51', 'BSI-DSZ-CC-0831-V7-2023', 'BSI-DSZ-CC-0817-V2-2016', 'ANSSI-CC-2016/27', 'BSI-DSZ-CC-0831-V2-2020', 'BSI-DSZ-CC-0919-V2-2021', 'ANSSI-CC-2016/38', 'BSI-DSZ-CC-0831-V4-2021', 'BSI-DSZ-CC-0978-V3-2019', 'BSI-DSZ-CC-0918-V6-2024']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0978a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0978b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0957-V2-2016', 'ANSSI-CC-2016/49', 'ANSSI-CC-2016/40', 'ANSSI-CC-2016/39', 'ANSSI-CC-2016/41']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0822-V4-2023', 'BSI-DSZ-CC-0957-V2-2016', 'BSI-DSZ-CC-0918-2020', 'BSI-DSZ-CC-0918-V3-2022', 'ANSSI-CC-2016/49', 'ANSSI-CC-2016/40', 'BSI-DSZ-CC-0919-V2-2021', 'BSI-DSZ-CC-0822-V5-2023', 'ANSSI-CC-2016/39', 'BSI-DSZ-CC-0918-V5-2023', 'BSI-DSZ-CC-0918-V2-2021', 'ANSSI-CC-2016/41', 'BSI-DSZ-CC-0918-V4-2022', 'BSI-DSZ-CC-0918-V6-2024', 'BSI-DSZ-CC-0919-V3-2023']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0817-V2-2016', 'ANSSI-CC-2016/39', 'ANSSI-CC-2016/29', 'ANSSI-CC-2016/41', 'BSI-DSZ-CC-0809-V2-2016']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V7-2023', 'BSI-DSZ-CC-0817-V2-2016', 'ANSSI-CC-2016/39', 'ANSSI-CC-2016/29', 'BSI-DSZ-CC-0831-V6-2023', 'ANSSI-CC-2016/41', 'BSI-DSZ-CC-0809-V2-2016', 'BSI-DSZ-CC-0978-V3-2019', 'BSI-DSZ-CC-0831-V5-2022']}}} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "6ce78dc0d982a21f",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0978-2016",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/38",
          "ANSSI-CC-2016/28",
          "ANSSI-CC-2016/39",
          "BSI-DSZ-CC-0957-V2-2016",
          "ANSSI-CC-2016/49",
          "BSI-DSZ-CC-0817-V2-2016",
          "ANSSI-CC-2016/52",
          "ANSSI-CC-2016/29",
          "ANSSI-CC-2016/30",
          "BSI-DSZ-CC-0978-V2-2017",
          "ANSSI-CC-2016/41",
          "ANSSI-CC-2016/50",
          "ANSSI-CC-2016/51",
          "ANSSI-CC-2016/40",
          "ANSSI-CC-2016/27",
          "BSI-DSZ-CC-0808-V2-2016",
          "BSI-DSZ-CC-0809-V2-2016",
          "ANSSI-CC-2016/26"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/38",
          "ANSSI-CC-2016/52",
          "BSI-DSZ-CC-0831-V6-2023",
          "BSI-DSZ-CC-0809-V3-2017",
          "BSI-DSZ-CC-0817-V2-2016",
          "BSI-DSZ-CC-0808-V3-2017",
          "BSI-DSZ-CC-0978-V3-2019",
          "BSI-DSZ-CC-0831-V3-2021",
          "BSI-DSZ-CC-0831-V7-2023",
          "BSI-DSZ-CC-0809-V2-2016",
          "BSI-DSZ-CC-0918-V4-2022",
          "ANSSI-CC-2016/29",
          "ANSSI-CC-2016/30",
          "BSI-DSZ-CC-0919-V2-2021",
          "ANSSI-CC-2016/51",
          "BSI-DSZ-CC-0918-V6-2024",
          "ANSSI-CC-2016/40",
          "ANSSI-CC-2016/27",
          "ANSSI-CC-2016/26",
          "BSI-DSZ-CC-0831-V4-2021",
          "ANSSI-CC-2016/39",
          "ANSSI-CC-2016/41",
          "BSI-DSZ-CC-0918-V5-2023",
          "ANSSI-CC-2016/28",
          "BSI-DSZ-CC-0957-V2-2016",
          "ANSSI-CC-2016/49",
          "BSI-DSZ-CC-0978-V2-2017",
          "BSI-DSZ-CC-1035-2017",
          "ANSSI-CC-2016/50",
          "BSI-DSZ-CC-0831-V5-2022",
          "BSI-DSZ-CC-0831-V2-2020",
          "BSI-DSZ-CC-0808-V2-2016",
          "BSI-DSZ-CC-0919-V3-2023"
        ]
      },
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/38",
          "ANSSI-CC-2016/39",
          "BSI-DSZ-CC-0957-V2-2016",
          "ANSSI-CC-2016/49",
          "ANSSI-CC-2016/52",
          "ANSSI-CC-2016/41",
          "ANSSI-CC-2016/50",
          "ANSSI-CC-2016/51",
          "ANSSI-CC-2016/40"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/38",
          "ANSSI-CC-2016/52",
          "BSI-DSZ-CC-0822-V4-2023",
          "BSI-DSZ-CC-0919-V3-2023",
          "BSI-DSZ-CC-0918-V4-2022",
          "BSI-DSZ-CC-0919-V2-2021",
          "ANSSI-CC-2016/51",
          "BSI-DSZ-CC-0918-V6-2024",
          "ANSSI-CC-2016/40",
          "ANSSI-CC-2016/39",
          "ANSSI-CC-2016/41",
          "BSI-DSZ-CC-0918-V5-2023",
          "BSI-DSZ-CC-0957-V2-2016",
          "ANSSI-CC-2016/49",
          "BSI-DSZ-CC-0918-V2-2021",
          "ANSSI-CC-2016/50",
          "BSI-DSZ-CC-0918-2020",
          "BSI-DSZ-CC-0918-V3-2022",
          "BSI-DSZ-CC-0822-V5-2023"
        ]
      },
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2018-08-17",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0978V2ma1a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software"
      }
    ]
  },
  "manufacturer": "NXP Semiconductors Germany GmbH Business Line Identification",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software",
  "not_valid_after": "2021-02-05",
  "not_valid_before": "2016-02-05",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0978a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1 SOGIS Recognition Agreement",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0978-2016",
        "cert_item": "NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software",
        "cert_lab": "BSI",
        "developer": "NXP Semiconductors Germany GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0978": 2,
          "BSI-DSZ-CC-0978-2016": 22
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 7
        },
        "R": {
          "R.O": 7
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 2,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 2,
          "ADV_SPM": 1,
          "ADV_SPM.1": 2,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 2,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 1,
          "ALC_CMC.5": 3,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR": 3,
          "ALC_FLR.1": 6,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 3
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 2,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 2,
          "ATE_DPT.4": 1,
          "ATE_FUN": 3,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 2,
          "ATE_IND": 2,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 3,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 7,
          "EAL 2": 7,
          "EAL 3": 4,
          "EAL 4": 6,
          "EAL 5": 9,
          "EAL 5+": 1,
          "EAL 6": 8,
          "EAL 6 augmented": 3,
          "EAL 7": 4,
          "EAL5": 1
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, NXP Semiconductors, Version 2.61, 14 October 2015 (confidential document) [7] Evaluation Technical Report, NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE": 1,
          "Certification Report Software, T\u00dcV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [11] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Configuration List,NXP": 1,
          "Document Number 2250** ,NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors": 1,
          "Document Number 2333**, NXP Semiconductors, Version 4.2, 24 June 2015 (confidential document) [20] Product data sheet SmartMX2 family P60N144 VA, Secure high-performance smart card controller": 1,
          "IC Dedicated Software, T\u00dcV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [9": 1,
          "NXP Semiconductors Document Number 1658**, NXP Semiconductors, Version 5.4, 14 August 2015 (confidential document) [14] Instruction Set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors": 1,
          "NXP Semiconductors, Document Number 1569**, NXP Semiconductors, Version 3.7, 21 May 2014 (confidential document) [17] Product data sheet addendum: SmartMX2 family Post Delivery Configuration (PDC), NXP": 1,
          "Number 1478**, NXP Semiconductors, Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60x080/144P VA/VE": 1,
          "Number 2244**, NXP Semiconductors, Version 3.1, 01 October 2014 (confidential document) [19] Product data sheet addendum: SmartMX2 family Firmware Interface Specification (FIS), NXP": 1,
          "Semiconductors, Document Number 2408**, NXP Semiconductors, Version 3.2, 14 August 2014 (confidential document) [21] Product data sheet addendum: SmartMX2 family P60N144 VA/VE, Wafer and delivery specification": 1,
          "Semiconductors, Document Number 2414**, NXP Semiconductors, Version 3.2, 06 June 2015 (confidential document) [22] Order Entry Form, P60C144, NXP Semiconductors, Version 3.2, 06 October 2015 [23] Order Entry": 1,
          "Semiconductors, NXP Semiconductors, Version 2.7, 12 November 2015 (confidential document) [16] Product data sheet addendum: SmartMX2 family P60D080/144 VA/VE and P60C080/144 VA/VE": 1,
          "Version 1.4, 11 September 2015 (confidential document) [13] Product data sheet SmartMX2 family P60x080/144 VA/VE, Secure high-performance smart card": 1,
          "Version 2.7, 25 September 2015 (confidential document) [12] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Evaluation Reference List, NXP": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX2": 16
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 4,
          "T\u00dcViT": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 3
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "DPA": 1,
          "SPA": 1
        },
        "other": {
          "JIL": 3
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 25": 2,
          "AIS 26": 2,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 3,
          "AIS 37": 1,
          "AIS 38": 1,
          "AIS31": 1
        },
        "ISO": {
          "ISO/IEC 14443": 4,
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 7816": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "DES": {
          "3DES": {
            "TDES": 3,
            "Triple-DES": 5
          },
          "DES": {
            "DES": 4
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 36,
          "NXP Semiconductors": 53
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20160223160422+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, BSI, P60x144/080yVA/yVA(Y/B/X)y/VE, Secure Smart Card Controller, EAL6, NXP\"",
      "/ModDate": "D:20160224080500+01\u002700\u0027",
      "/Producer": "LibreOffice 4.2",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0978-2016",
      "pdf_file_size_bytes": 1316475,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.sogisportal.eu/",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierungsreporte"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 42
    },
    "st_filename": "0978b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0978": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.CUST_RECONFIG": 5,
          "O.EEPROM_INTEGRITY": 5,
          "O.FM_FW": 9,
          "O.HW_AES": 7,
          "O.MEM_ACCESS": 9,
          "O.RND": 3,
          "O.SFR_ACCESS": 9
        },
        "T": {
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0035": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 4,
          "ADV_FSP.4": 3,
          "ADV_FSP.5": 11,
          "ADV_IMP": 1,
          "ADV_IMP.2": 4,
          "ADV_INT.3": 1,
          "ADV_SPM": 2,
          "ADV_SPM.1": 1,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 4,
          "ALC_CMC.4": 3,
          "ALC_CMC.5": 4,
          "ALC_CMS": 4,
          "ALC_CMS.4": 3,
          "ALC_CMS.5": 5,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.2": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.3": 4,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6": 2,
          "EAL4": 3,
          "EAL4 augmented": 1,
          "EAL4+": 1,
          "EAL6": 36,
          "EAL6 augmented": 3,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 7,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 5,
          "FCS_CKM.4": 3,
          "FCS_COP.1": 23,
          "FCS_COP.1.1": 2,
          "FCS_RNG.1": 9,
          "FCS_RNG.1.1": 3,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC.1": 35,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 32,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_FLS.1": 1,
          "FDP_IFC.1": 10,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 5,
          "FDP_ITT.1": 6,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 7,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FMT": {
          "FMT_LIM.1": 3,
          "FMT_LIM.2": 4,
          "FMT_MSA.1": 25,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 20,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_SMF.1": 19,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 7
        },
        "FPT": {
          "FPT_FLS.1": 7,
          "FPT_ITT.1": 6,
          "FPT_PHP.3": 7
        },
        "FRU": {
          "FRU_FLT.2": 7
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 1,
          "SmartMX2": 21
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 5,
          "RNG": 14
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 10,
          "fault injection": 3,
          "malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 13,
          "Physical Probing": 2,
          "physical probing": 1,
          "side channel": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-004": 2
        },
        "FIPS": {
          "FIPS PUB 197": 3,
          "FIPS PUB 46": 1,
          "FIPS PUB 46-3": 3
        },
        "ISO": {
          "ISO/IEC 14443": 16,
          "ISO/IEC 18092": 2,
          "ISO/IEC 7816": 22
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 32
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 3,
            "Triple-DEA": 1,
            "Triple-DES": 9
          },
          "DES": {
            "DEA": 2,
            "DES": 16
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 138,
          "NXP Semiconductors": 49
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Alternative descriptive title": "Security Target Lite",
      "/Author": "NXP Semiconductors",
      "/CertificationID": "BSI-DSZ-CC-0978",
      "/Company": "NXP Semiconductors GmbH Germany",
      "/Copyright date": "2015",
      "/CreationDate": "D:20151210161030+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 11 f\u00fcr Word",
      "/Descriptive title": "Security Target Lite",
      "/Division": "NXP Semiconductors",
      "/Document identifier": " ",
      "/Keywords": "CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144yVA, P60D080yVA, P60D144yVE, P60D080yVE",
      "/ModDate": "D:20151210161132+01\u002700\u0027",
      "/Modification date": "14 October 2015",
      "/Producer": "Adobe PDF Library 11.0",
      "/Product name title": "\u003cnot applicable\u003e",
      "/Revision": "Rev. 2.61",
      "/Security status": "\u003cSecurity status\u003e",
      "/SourceModified": "D:20151210150346",
      "/Specification status": "Evaluation documentation                                    PUBLIC",
      "/Subject": "P60x144/080yVA/yVA(Y/B/X)/yVE",
      "/Template date": "29 January 2010",
      "/Template version": "2.9.0",
      "/Title": "Security Target Lite",
      "/docpath": "W:\\WORKAREA_01\\data\\id_smx21_lib\\id_smx21\\DOCUMENTS\\project_docu\\Evaluation\\Procedure_P60D144\\ASE",
      "/list_of_authors": " ",
      "/philips_smx_cl_docpath": "I:\\P5_CryptoLib\\SmxCl\\docs\\99_prj_mgmt\\Templates\\V2.9.0_R1",
      "/relBiblioPath": "..\\Bibliography.doc",
      "/test_sec_row_naming": "manufacturer area",
      "/text_cert_body_long": "Bundesamt fuer Sicherheit in der Informationstechnik",
      "/text_cert_body_short": "BSI",
      "/text_developer_long": "NXP Semiconductors, Business Unit Security \u0026 Connectivity",
      "/text_developer_short": "NXP Semiconductors",
      "/text_product_cfgC080": "P60C080P",
      "/text_product_cfgC144": "P60C144P",
      "/text_product_cfgD080": "P60D080y",
      "/text_product_cfgD144": "P60D144y",
      "/text_product_cfgD144_nameplate": "9050C",
      "/text_product_letter": "A",
      "/text_product_long": "NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE",
      "/text_product_minor": "VA/VE",
      "/text_product_short": "NXP Secure Smart Card Controller P60x144/080y",
      "/text_product_short_pa": "P60x144/080yVA/VE",
      "/text_product_short_pa_b": "P60x144/080yVA(B)",
      "/text_product_short_pa_y": "P60x144/080yVA(Y)",
      "/text_product_short_pe": "P60x144/080yVE",
      "/text_sponsor_long": "NXP Semiconductors, Business Unit Security \u0026 Connectivity",
      "/text_sponsor_short": "NXP",
      "pdf_file_size_bytes": 878457,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.nxp.com/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 87
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "SECURITY_IC_V1.0",
            "PKISKPP"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf",
        "pp_name": "Security IC Platform Protection Profile, Version 1.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0978a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL6+",
      "ALC_FLR.1",
      "ASE_TSS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0978b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "be3fc3fa8851f16aa02445b6d43a0d05dcae3aded916d5ca0ddefc07200624f2",
      "txt_hash": "532d223e7b93839f1b0a634a1edcfe27691bb9bbb5e1cfa704437449643cf98a"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "21e2fdbc441003344f6bfb846d02418402eebcf5bf09d26d33adac2a0348fcb3",
      "txt_hash": "e89fa1f8b114250cfe1c97b48bf1d36845b6f05a4f72addb81cb1aec7134b617"
    }
  },
  "status": "archived"
}