Crypto Library Cobalt on N7021 VA

CSV information ?

Status archived
Valid from 24.11.2017
Valid until 24.11.2022
Scheme 🇩🇪 DE
Manufacturer NXP Semiconductors Germany GmbH Business Line Identification
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL6+, ASE_TSS.2, ALC_FLR.1

Heuristics summary ?

Certificate ?

Certification report ?

Security target ?

Heuristics ?

No heuristics are available for this certificate.

Extracted SARs

ASE_TSS.2, ALC_FLR.1

References ?

No references are available for this certificate as its ID was not successfully extracted.

Updates ?

  • 08.07.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}]} values discarded.
  • 11.06.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f5431a78f90d400bf0edfef96155c8f58076540d3e0ded7561229c340dab25b6', 'txt_hash': '7d4761da855d950d9d267e7faeb4f1a99676b91a68d9ceefc562ce7d2cd8a994'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7935971621d0713a543dae56c54753f9aac61a6df5b5cb8434edfa6d3a0eaf0f', 'txt_hash': '778dc38350bc1a50682c1dfc7a74556393d410f1e2a5db546aecc901f7cae139'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1007137, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 30, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20171205110617+01'00'", '/Creator': 'Writer', '/Keywords': 'Common Criteria, Certification, Zertifizierung, Smart Card, Crypto Library Cobalt on N7021 VA, NXP Semiconductors Germany GmbH', '/ModDate': "D:20171207110049+01'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-1019-2017', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.sogisportal.eu/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 219892, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 36, '/Author': 'NXP Semiconductors', '/CreationDate': "D:20171212162609+01'00'", '/Creator': 'DITA Open Toolkit', '/Keywords': 'Common Criteria, Security Target Lite, Crypto Library Cobalt, EAL6+, N7021 VA', '/ModDate': "D:20171212171615+01'00'", '/PDFVersion': '1.4', '/Producer': 'Apache FOP Version 1.1', '/Subject': 'Crypto Library Cobalt on N7021 VA', '/Title': 'Crypto Library Cobalt Security Target Lite', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1019-2017', 'cert_item': 'Crypto Library Cobalt on N7021 VA', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2 and ALC_FLR.1'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1019-2017': 15, 'BSI-DSZ-CC-1019': 2, 'BSI-DSZ-CC-0977-2017': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 4}}, 'cc_security_level': {'EAL': {'EAL 6': 5, 'EAL 5': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 4': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 4, 'ALC_FLR': 3, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_FUN': 1, 'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 6}, 'R': {'R.O': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 17, 'NXP': 9}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 2}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 9}}, 'FF': {'DH': {'Diffie-Hellman': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-224': 3, 'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 3}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side-channel': 1, 'DPA': 2, 'SPA': 1}, 'FI': {'fault injection': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 1, 'FIPS PUB 180-4': 1}, 'PKCS': {'PKCS #1': 1}, 'BSI': {'AIS 34': 2, 'AIS 36': 4, 'AIS 25': 2, 'AIS 26': 2, 'AIS 37': 2, 'AIS 35': 2, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 20': 1, 'AIS 23': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 38': 1, 'AIS 41': 1, 'AIS 46': 1, 'AIS 47': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Cobalt on N7021 VA Security Target, BSI-DSZ-CC-1019, Version 1.2, 5 July 2017, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 2, 20 October 2017, EVALUATION TECHNICAL REPORT SUMMARY': 1, 'SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January': 1, 'EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration lists for the TOE: • Version 1.3, 07 March 2017, Crypto Library Iron / Cobalt': 1, '0 on N7021 VA, Life Cycle (confidential document) • Version 1.0, 07 March 2017, P71D320 Crypto Library, Configuration Item List, Evaluation': 1, 'confidential document) [12] Guidance documentation for the TOE: • Version 1.7, 19 April 2017, Crypto Library Cobalt V1.0': 1, 'N7021 VA Information on Guidance and Operation (confidential document) • Version 1.2, 19 January 2017, N7021 Crypto Library ECC over GF(p) Library (confidential document': 1, '• Version 1.0, 29 September 2016, N7021 Crypto Library HASH Library (confidential document) • Version 1.3, 12 April 2017, N7021 Crypto Library RSA Library (confidential document) • Version 1': 1, '16 September 2016, N7021 Crypto Library RSA Key Generation Library (confidential document) • AIS 34, Version 3, Evaluation Methodology for CC Assurance Classes for EAL 5+ (CCv2.3 & CCv3.1': 1, 'Report BSI-DSZ-CC-1019-2017 • Version 1.0, 29 September 2016, N7021 Crypto Library SHA Library (confidential document) • Version 1.0, 28 November 2016, N7021 Crypto Library UtilsAsym Library (confidential document': 1, 'for Composite Evaluation for the N7021 VA, Version 2, 30 June 2017, TÜV Informationstechnik GmbH (confidential document) [15] NXP Secure Smart Card Controller N7021 VA Security Target Lite, BSI-DSZ-CC- 0977-2017': 1, 'family N7021 Wafer and delivery specification, Version 1.1, 05 August 2016, NXP Semiconductors (confidential document) 26 / 31 BSI-DSZ-CC-1019-2017 Certification Report C. Excerpts from the Criteria For the meaning': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1019': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6': 32, 'EAL 6': 1, 'EAL6+': 6, 'EAL4+': 2, 'EAL4': 1, 'EAL6 augmented': 2, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 2, 'ADV_IMP.2': 2, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 3, 'ALC_CMC.5': 2, 'ALC_CMS.5': 2, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 3}, 'ASE': {'ASE_TSS.2': 3, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FCS': {'FCS_COP': 25, 'FCS_CKM': 8, 'FCS_CKM.4': 14, 'FCS_COP.1': 8, 'FCS_CKM.1': 11, 'FCS_CKM.2': 2, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ITC.1': 8, 'FDP_ITC.2': 8, 'FDP_IFC.1': 8, 'FDP_RIP.1': 9, 'FDP_ITT.1': 1}, 'FPT': {'FPT_ITT.1': 8, 'FPT_FLS.1': 8}, 'FRU': {'FRU_FLT.2': 8}}, 'cc_claims': {'O': {'O.RSA': 5, 'O.ECDSA': 5, 'O.ECC_DHKE': 4, 'O.SHA': 5}}, 'vendor': {'NXP': {'NXP Semiconductors': 17, 'NXP': 49}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 2}, 'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 21}, 'ECC': {'ECC': 33}}, 'FF': {'DH': {'Diffie-Hellman': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-224': 8, 'SHA-256': 8, 'SHA-384': 8, 'SHA-512': 8}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library ..................................................15': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'DPA': 3, 'timing attacks': 2, 'template attacks': 2}, 'FI': {'Malfunction': 1, 'malfunction': 1, 'DFA': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 2, 'FIPS 186-4': 2}, 'PKCS': {'PKCS #1': 8}, 'ISO': {'ISO/IEC 15946-2': 2, 'ISO/IEC 15946-3': 1, 'ISO/IEC 15946-1': 2}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 1019a_pdf.pdf.
    • The st_filename property was set to 1019b_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1019-2017.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['21.0.03/TSE-CCCS-59']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['21.0.03/TSE-CCCS-59']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1019-V2-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1019-V2-2019']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0977-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0977-2017']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}]} values added.
  • 09.06.2024 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is https://www.nxp.com.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': None}]}.
  • 03.06.2024 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'SECURITY_IC_AUGP_V1.0', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}]} values discarded.
  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f5431a78f90d400bf0edfef96155c8f58076540d3e0ded7561229c340dab25b6', 'txt_hash': '7d4761da855d950d9d267e7faeb4f1a99676b91a68d9ceefc562ce7d2cd8a994'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7935971621d0713a543dae56c54753f9aac61a6df5b5cb8434edfa6d3a0eaf0f', 'txt_hash': '778dc38350bc1a50682c1dfc7a74556393d410f1e2a5db546aecc901f7cae139'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1019-2017', 'cert_item': 'Crypto Library Cobalt on N7021 VA', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2 and ALC_FLR.1'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1019': 2}, '__update__': {'BSI-DSZ-CC-1019-2017': 15, 'BSI-DSZ-CC-0977-2017': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1019': 1}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1019-2017': 30, 'BSI-DSZ-CC-0977-2017': 2}, '__delete__': ['BSI-DSZ-CC-1019']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1019': 2}, '__update__': {'BSI-DSZ-CC-1019-2017': 15, 'BSI-DSZ-CC-0977-2017': 1}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1019': 1}, 'CA': {'15946-2 17': 1, '15946-3 21': 1}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['21.0.03/TSE-CCCS-59']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['21.0.03/TSE-CCCS-59']}} data.
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1019-V2-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1019-V2-2019']}} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The report_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was updated.
    • The report_pdf_hash property was set to f5431a78f90d400bf0edfef96155c8f58076540d3e0ded7561229c340dab25b6.
    • The st_txt_hash property was set to 778dc38350bc1a50682c1dfc7a74556393d410f1e2a5db546aecc901f7cae139.
    • The report_txt_hash property was set to 7d4761da855d950d9d267e7faeb4f1a99676b91a68d9ceefc562ce7d2cd8a994.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1007137, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 30, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20171205110617+01'00'", '/Creator': 'Writer', '/Keywords': 'Common Criteria, Certification, Zertifizierung, Smart Card, Crypto Library Cobalt on N7021 VA, NXP Semiconductors Germany GmbH', '/ModDate': "D:20171207110049+01'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-1019-2017', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.sogisportal.eu/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 219892, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 36, '/Author': 'NXP Semiconductors', '/CreationDate': "D:20171212162609+01'00'", '/Creator': 'DITA Open Toolkit', '/Keywords': 'Common Criteria, Security Target Lite, Crypto Library Cobalt, EAL6+, N7021 VA', '/ModDate': "D:20171212171615+01'00'", '/PDFVersion': '1.4', '/Producer': 'Apache FOP Version 1.1', '/Subject': 'Crypto Library Cobalt on N7021 VA', '/Title': 'Crypto Library Cobalt Security Target Lite', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1019-2017', 'cert_item': 'Crypto Library Cobalt on N7021 VA', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2 and ALC_FLR.1'}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1019-2017': 30, 'BSI-DSZ-CC-0977-2017': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 4}}, 'cc_security_level': {'EAL': {'EAL 6': 5, 'EAL 5': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 4': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 4, 'ALC_FLR': 3, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_FUN': 1, 'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 6}, 'R': {'R.O': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 17, 'NXP': 9}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 2}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 9}}, 'FF': {'DH': {'Diffie-Hellman': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-224': 3, 'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 3}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side-channel': 1, 'DPA': 2, 'SPA': 1}, 'FI': {'fault injection': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 1, 'FIPS PUB 180-4': 1}, 'PKCS': {'PKCS #1': 1}, 'BSI': {'AIS 34': 2, 'AIS 36': 4, 'AIS 25': 2, 'AIS 26': 2, 'AIS 37': 2, 'AIS 35': 2, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 20': 1, 'AIS 23': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 38': 1, 'AIS 41': 1, 'AIS 46': 1, 'AIS 47': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Cobalt on N7021 VA Security Target, BSI-DSZ-CC-1019, Version 1.2, 5 July 2017, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 2, 20 October 2017, EVALUATION TECHNICAL REPORT SUMMARY': 1, 'SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January': 1, 'EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration lists for the TOE: • Version 1.3, 07 March 2017, Crypto Library Iron / Cobalt': 1, '0 on N7021 VA, Life Cycle (confidential document) • Version 1.0, 07 March 2017, P71D320 Crypto Library, Configuration Item List, Evaluation': 1, 'confidential document) [12] Guidance documentation for the TOE: • Version 1.7, 19 April 2017, Crypto Library Cobalt V1.0': 1, 'N7021 VA Information on Guidance and Operation (confidential document) • Version 1.2, 19 January 2017, N7021 Crypto Library ECC over GF(p) Library (confidential document': 1, '• Version 1.0, 29 September 2016, N7021 Crypto Library HASH Library (confidential document) • Version 1.3, 12 April 2017, N7021 Crypto Library RSA Library (confidential document) • Version 1': 1, '16 September 2016, N7021 Crypto Library RSA Key Generation Library (confidential document) • AIS 34, Version 3, Evaluation Methodology for CC Assurance Classes for EAL 5+ (CCv2.3 & CCv3.1': 1, 'Report BSI-DSZ-CC-1019-2017 • Version 1.0, 29 September 2016, N7021 Crypto Library SHA Library (confidential document) • Version 1.0, 28 November 2016, N7021 Crypto Library UtilsAsym Library (confidential document': 1, 'for Composite Evaluation for the N7021 VA, Version 2, 30 June 2017, TÜV Informationstechnik GmbH (confidential document) [15] NXP Secure Smart Card Controller N7021 VA Security Target Lite, BSI-DSZ-CC- 0977-2017': 1, 'family N7021 Wafer and delivery specification, Version 1.1, 05 August 2016, NXP Semiconductors (confidential document) 26 / 31 BSI-DSZ-CC-1019-2017 Certification Report C. Excerpts from the Criteria For the meaning': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6': 32, 'EAL 6': 1, 'EAL6+': 6, 'EAL4+': 2, 'EAL4': 1, 'EAL6 augmented': 2, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 2, 'ADV_IMP.2': 2, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 3, 'ALC_CMC.5': 2, 'ALC_CMS.5': 2, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 3}, 'ASE': {'ASE_TSS.2': 3, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FCS': {'FCS_COP': 25, 'FCS_CKM': 8, 'FCS_CKM.4': 14, 'FCS_COP.1': 8, 'FCS_CKM.1': 11, 'FCS_CKM.2': 2, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ITC.1': 8, 'FDP_ITC.2': 8, 'FDP_IFC.1': 8, 'FDP_RIP.1': 9, 'FDP_ITT.1': 1}, 'FPT': {'FPT_ITT.1': 8, 'FPT_FLS.1': 8}, 'FRU': {'FRU_FLT.2': 8}}, 'cc_claims': {'O': {'O.RSA': 5, 'O.ECDSA': 5, 'O.ECC_DHKE': 4, 'O.SHA': 5}}, 'vendor': {'NXP': {'NXP Semiconductors': 17, 'NXP': 49}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 2}, 'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 21}, 'ECC': {'ECC': 33}}, 'FF': {'DH': {'Diffie-Hellman': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-224': 8, 'SHA-256': 8, 'SHA-384': 8, 'SHA-512': 8}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library ..................................................15': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'DPA': 3, 'timing attacks': 2, 'template attacks': 2}, 'FI': {'Malfunction': 1, 'malfunction': 1, 'DFA': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 2, 'FIPS 186-4': 2}, 'PKCS': {'PKCS #1': 8}, 'ISO': {'ISO/IEC 15946-2': 2, 'ISO/IEC 15946-3': 1, 'ISO/IEC 15946-1': 2}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 1019a_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1019-2017.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['21.0.03/TSE-CCCS-59']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['21.0.03/TSE-CCCS-59']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0977-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0977-2017']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1019a_pdf.pdf, code: 408', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1019a_pdf.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1019b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to 7935971621d0713a543dae56c54753f9aac61a6df5b5cb8434edfa6d3a0eaf0f.
    • The report_pdf_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to 1019b_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}]} values discarded.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1019b_pdf.pdf, code: 408'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1019b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}]} values discarded.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['21.0.03/TSE-CCCS-59']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['21.0.03/TSE-CCCS-59']}} data.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
  • 25.11.2022 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0', 'JAVA_OC']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '1019a_pdf.pdf', 'st_filename': '1019b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1019-2017': 30}}}}, 'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL 4': 1}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.1': 4}}}}, 'cc_claims': {'__update__': {'R': {'R.O': 6}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP': 9}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'Diffie-Hellman': 3}, '__delete__': ['DH']}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-512': 3}}}}}}, 'crypto_scheme': {'__update__': {'KEX': {'__update__': {'Key Exchange': 2}}}}, 'randomness': {'__delete__': ['RNG']}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-02102': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'BSI': {'__delete__': ['AIS 7']}, 'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Cobalt on N7021 VA Security Target, BSI-DSZ-CC-1019, Version 1.2, 5 July 2017, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 2, 20 October 2017, EVALUATION TECHNICAL REPORT SUMMARY': 1, 'SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January': 1, 'EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration lists for the TOE: • Version 1.3, 07 March 2017, Crypto Library Iron / Cobalt': 1, '0 on N7021 VA, Life Cycle (confidential document) • Version 1.0, 07 March 2017, P71D320 Crypto Library, Configuration Item List, Evaluation': 1, 'confidential document) [12] Guidance documentation for the TOE: • Version 1.7, 19 April 2017, Crypto Library Cobalt V1.0': 1, 'N7021 VA Information on Guidance and Operation (confidential document) • Version 1.2, 19 January 2017, N7021 Crypto Library ECC over GF(p) Library (confidential document': 1, '• Version 1.0, 29 September 2016, N7021 Crypto Library HASH Library (confidential document) • Version 1.3, 12 April 2017, N7021 Crypto Library RSA Library (confidential document) • Version 1': 1, '16 September 2016, N7021 Crypto Library RSA Key Generation Library (confidential document) • AIS 34, Version 3, Evaluation Methodology for CC Assurance Classes for EAL 5+ (CCv2.3 & CCv3.1': 1, 'Report BSI-DSZ-CC-1019-2017 • Version 1.0, 29 September 2016, N7021 Crypto Library SHA Library (confidential document) • Version 1.0, 28 November 2016, N7021 Crypto Library UtilsAsym Library (confidential document': 1, 'for Composite Evaluation for the N7021 VA, Version 2, 30 June 2017, TÜV Informationstechnik GmbH (confidential document) [15] NXP Secure Smart Card Controller N7021 VA Security Target Lite, BSI-DSZ-CC- 0977-2017': 1, 'family N7021 Wafer and delivery specification, Version 1.1, 05 August 2016, NXP Semiconductors (confidential document) 26 / 31 BSI-DSZ-CC-1019-2017 Certification Report C. Excerpts from the Criteria For the meaning': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL 6 augmented': 1}, '__update__': {'EAL6+': 6, 'EAL4+': 2, 'EAL6 augmented': 2}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.1': 3}}}}, 'cc_sfr': {'__update__': {'FCS': {'__insert__': {'FCS_COP': 25, 'FCS_CKM': 8}, '__update__': {'FCS_CKM.1': 11, 'FCS_COP.1': 8}}, 'FDP': {'__insert__': {'FDP_RIP.1': 9, 'FDP_ITT.1': 1}}, 'FPT': {'__insert__': {'FPT_ITT.1': 8}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.ECC_DHKE': 4}}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP Semiconductors': 17, 'NXP': 49}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDSA': {'__update__': {'ECDSA': 21}}, 'ECC': {'__update__': {'ECC': 33}}}}, 'FF': {'__update__': {'DH': {'__update__': {'Diffie-Hellman': 5}, '__delete__': ['DH']}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-512': 8}}}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__insert__': {'timing attacks': 2}}}}, 'standard_id': {'__update__': {'CC': {'__update__': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}}}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['21.0.03/TSE-CCCS-59']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['21.0.03/TSE-CCCS-59']}} data.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 219892, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 36, '/Author': 'NXP Semiconductors', '/CreationDate': "D:20171212162609+01'00'", '/Creator': 'DITA Open Toolkit', '/Keywords': 'Common Criteria, Security Target Lite, Crypto Library Cobalt, EAL6+, N7021 VA', '/ModDate': "D:20171212171615+01'00'", '/PDFVersion': '1.4', '/Producer': 'Apache FOP Version 1.1', '/Subject': 'Crypto Library Cobalt on N7021 VA', '/Title': 'Crypto Library Cobalt Security Target Lite', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0', 'JAVA_OC']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/36641ce7192b5f92.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/36641ce7192b5f92.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.sogisportal.eu/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/']}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1019-2017': 60, 'BSI-DSZ-CC-0977-2017': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 4}}, 'cc_security_level': {'EAL': {'EAL 6': 5, 'EAL 5': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 3, 'ALC_FLR': 3, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_FUN': 1, 'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 6}, 'R': {'R.O.C': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 17, 'NXP': 8}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 2}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 9}}, 'FF': {'DH': {'DH': 2, 'Diffie-Hellman': 4}, 'DSA': {'DSA': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-224': 3, 'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 1}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 2}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side-channel': 1, 'DPA': 2, 'SPA': 1}, 'FI': {'fault injection': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 1, 'FIPS PUB 180-4': 1}, 'PKCS': {'PKCS #1': 1}, 'BSI': {'AIS 34': 2, 'AIS 36': 4, 'AIS 25': 2, 'AIS 26': 2, 'AIS 37': 2, 'AIS 35': 2, 'AIS 7': 1, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 20': 1, 'AIS 23': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 38': 1, 'AIS 41': 1, 'AIS 46': 1, 'AIS 47': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Cobalt on N7021 VA Security Target, BSI-DSZ-CC-1019, Version 1.2, 5 July 2017, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 2, 20 October 2017, EVALUATION TECHNICAL REPORT SUMMARY ': 1, 'ETR SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January': 1, '017, EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration lists for the TOE: • Version 1.3, 07 March 2017, Crypto Library Iron / Cobalt': 1, 'V1.0 on N7021 VA, Life Cycle (confidential document) • Version 1.0, 07 March 2017, P71D320 Crypto Library, Configuration Item List, Evaluation': 1, 'documentation (confidential document) [12] Guidance documentation for the TOE: • Version 1.7, 19 April 2017, Crypto Library Cobalt V1.0': 1, 'on N7021 VA Information on Guidance and Operation (confidential document) • Version 1.2, 19 January 2017, N7021 Crypto Library ECC over GF(p) Library (confidential document': 1, '• Version 1.0, 29 September 2016, N7021 Crypto Library HASH Library (confidential document) • Version 1.3, 12 April 2017, N7021 Crypto Library RSA Library (confidential document) • Version': 1, '1.0, 16 September 2016, N7021 Crypto Library RSA Key Generation Library (confidential document) • AIS 34, Version 3, Evaluation Methodology for CC Assurance Classes for EAL 5+ (CCv2.3 & CCv3.1': 1, 'ion Report BSI-DSZ-CC-1019-2017 • Version 1.0, 29 September 2016, N7021 Crypto Library SHA Library (confidential document) • Version 1.0, 28 November 2016, N7021 Crypto Library UtilsAsym Library (confidential document': 1, 't for Composite Evaluation for the N7021 VA, Version 2, 30 June 2017, TÜV Informationstechnik GmbH (confidential document) [15] NXP Secure Smart Card Controller N7021 VA Security Target Lite, BSI-DSZ-CC- 0977-2017': 1, 'MX3 family N7021 Wafer and delivery specification, Version 1.1, 05 August 2016, NXP Semiconductors (confidential document) 26 / 31 BSI-DSZ-CC-1019-2017 Certification Report C. Excerpts from the Criteria For the meaning': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6': 32, 'EAL 6': 1, 'EAL6+': 5, 'EAL4+': 1, 'EAL4': 1, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 2, 'ADV_IMP.2': 2, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.5': 2, 'ALC_CMS.5': 2, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_FLR.1': 2, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 3}, 'ASE': {'ASE_TSS.2': 3, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.4': 14, 'FCS_CKM.1': 9, 'FCS_CKM.2': 2, 'FCS_COP.1': 2, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ITC.1': 8, 'FDP_ITC.2': 8, 'FDP_IFC.1': 8}, 'FPT': {'FPT_FLS.1': 8}, 'FRU': {'FRU_FLT.2': 8}}, 'cc_claims': {'O': {'O.RSA': 5, 'O.ECDSA': 5, 'O.ECC_DHKE': 5, 'O.SHA': 5}}, 'vendor': {'NXP': {'NXP Semiconductors': 49, 'NXP': 53}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 2}, 'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 25}, 'ECC': {'ECC': 38}}, 'FF': {'DH': {'DH': 4, 'Diffie-Hellman': 6}, 'DSA': {'DSA': 25}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-224': 8, 'SHA-256': 8, 'SHA-384': 8, 'SHA-512': 7}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library ..................................................15': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'DPA': 3, 'template attacks': 2}, 'FI': {'Malfunction': 1, 'malfunction': 1, 'DFA': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 2, 'FIPS 186-4': 2}, 'PKCS': {'PKCS #1': 8}, 'ISO': {'ISO/IEC 15946-2': 2, 'ISO/IEC 15946-3': 1, 'ISO/IEC 15946-1': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'f5431a78f90d400bf0edfef96155c8f58076540d3e0ded7561229c340dab25b6', 'st_pdf_hash': '7935971621d0713a543dae56c54753f9aac61a6df5b5cb8434edfa6d3a0eaf0f', 'report_txt_hash': '7d4761da855d950d9d267e7faeb4f1a99676b91a68d9ceefc562ce7d2cd8a994', 'st_txt_hash': '778dc38350bc1a50682c1dfc7a74556393d410f1e2a5db546aecc901f7cae139'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {'ECDH': 2, 'ECDSA': 6, 'ECC': 9, 'DH': 2, 'Diffie-Hellman': 3, 'DSA': 6}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 3, 'SHA-224': 3, 'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 1}, 'rules_crypto_schemes': {'Key Exchange': 1}, 'rules_randomness': {'TRNG': 1, 'RNG': 2}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'physical probing': 1, 'side-channel': 1, 'SPA': 1, 'DPA': 2, 'fault injection': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 1, 'DES': 1}, 'rules_asymmetric_crypto': {'ECDH': 4, 'ECDSA': 25, 'ECC': 38, 'DH': 4, 'Diffie-Hellman': 5, 'DSA': 25}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 8, 'SHA-224': 8, 'SHA-256': 8, 'SHA-384': 8, 'SHA-512': 7}, 'rules_crypto_schemes': {'Key Exchange': 2}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {'Malfunction': 1, 'malfunction': 1, 'Leak-Inherent': 1, 'DPA': 3, 'DFA': 3, 'template attacks': 2}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1019-V2-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1019-V2-2019']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0977-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0977-2017']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 219892, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 36, '/Author': 'NXP Semiconductors', '/CreationDate': "D:20171212162609+01'00'", '/Creator': 'DITA Open Toolkit', '/Keywords': 'Common Criteria, Security Target Lite, Crypto Library Cobalt, EAL6+, N7021 VA', '/ModDate': "D:20171212171615+01'00'", '/PDFVersion': '1.4', '/Producer': 'Apache FOP Version 1.1', '/Subject': 'Crypto Library Cobalt on N7021 VA', '/Title': 'Crypto Library Cobalt Security Target Lite'}.
    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1019-V2-2019']}.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_AUGP_V1.0', 'BAROC_SC_PP_V1.0', 'JAVA_OC']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Crypto Library Cobalt on N7021 VA was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "36641ce7192b5f92",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": null,
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH Business Line Identification",
  "manufacturer_web": "https://www.nxp.com",
  "name": "Crypto Library Cobalt on N7021 VA",
  "not_valid_after": "2022-11-24",
  "not_valid_before": "2017-11-24",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": null,
    "report_frontpage": null,
    "report_keywords": null,
    "report_metadata": null,
    "st_filename": null,
    "st_frontpage": null,
    "st_keywords": null,
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf",
        "pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/1019a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ASE_TSS.2",
      "ALC_FLR.1",
      "EAL6+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/1019b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    }
  },
  "status": "archived"
}