Crypto Library Cobalt on N7021 VA

CSV information ?

Status archived
Valid from 24.11.2017
Valid until 24.11.2022
Scheme 🇩🇪 DE
Manufacturer NXP Semiconductors Germany GmbH Business Line Identification
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ASE_TSS.2, EAL6+, ALC_FLR.1
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1019-2017

Certificate ?

Certification report ?

Extracted keywords

Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
Key Exchange
Randomness
TRNG

Vendor
NXP Semiconductors, NXP

Security level
EAL 6, EAL 5, EAL 2, EAL 1, EAL 4, EAL 2+, EAL 5+, EAL 6 augmented
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_FUN, ATE_COV.3, ATE_DPT.3, ATE_IND, AVA_VAN, ASE_TSS.2
Protection profiles
BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1019-2017, BSI-DSZ-CC-1019, BSI-DSZ-CC-0977-2017
Evaluation facilities
TÃœV Informationstechnik

Side-channel analysis
physical probing, side-channel, DPA, SPA, fault injection, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Cobalt on N7021 VA Security Target, BSI-DSZ-CC-1019, Version 1.2, 5 July 2017, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 2, 20 October 2017, EVALUATION TECHNICAL REPORT SUMMARY, SUMMARY), TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration lists for the TOE: • Version 1.3, 07 March 2017, Crypto Library Iron / Cobalt, 0 on N7021 VA, Life Cycle (confidential document) • Version 1.0, 07 March 2017, P71D320 Crypto Library, Configuration Item List, Evaluation, confidential document) [12] Guidance documentation for the TOE: • Version 1.7, 19 April 2017, Crypto Library Cobalt V1.0, N7021 VA Information on Guidance and Operation (confidential document) • Version 1.2, 19 January 2017, N7021 Crypto Library ECC over GF(p) Library (confidential document, • Version 1.0, 29 September 2016, N7021 Crypto Library HASH Library (confidential document) • Version 1.3, 12 April 2017, N7021 Crypto Library RSA Library (confidential document) • Version 1, 16 September 2016, N7021 Crypto Library RSA Key Generation Library (confidential document) • AIS 34, Version 3, Evaluation Methodology for CC Assurance Classes for EAL 5+ (CCv2.3 & CCv3.1, Report BSI-DSZ-CC-1019-2017 • Version 1.0, 29 September 2016, N7021 Crypto Library SHA Library (confidential document) • Version 1.0, 28 November 2016, N7021 Crypto Library UtilsAsym Library (confidential document, for Composite Evaluation for the N7021 VA, Version 2, 30 June 2017, TÜV Informationstechnik GmbH (confidential document) [15] NXP Secure Smart Card Controller N7021 VA Security Target Lite, BSI-DSZ-CC- 0977-2017, family N7021 Wafer and delivery specification, Version 1.1, 05 August 2016, NXP Semiconductors (confidential document) 26 / 31 BSI-DSZ-CC-1019-2017 Certification Report C. Excerpts from the Criteria For the meaning

Standards
FIPS PUB 186-4, FIPS PUB 180-4, PKCS #1, AIS 34, AIS 36, AIS 25, AIS 26, AIS 37, AIS 35, AIS 1, AIS 14, AIS 19, AIS 20, AIS 23, AIS 31, AIS 32, AIS 38, AIS 41, AIS 46, AIS 47, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1019-2017
Subject Common Criteria Certification
Keywords Common Criteria, Certification, Zertifizierung, Smart Card, Crypto Library Cobalt on N7021 VA, NXP Semiconductors Germany GmbH
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20171205110617+01'00'
Modification date D:20171207110049+01'00'
Pages 30
Creator Writer
Producer LibreOffice 5.2

Frontpage

Certificate ID BSI-DSZ-CC-1019-2017
Certified item Crypto Library Cobalt on N7021 VA
Certification lab BSI
Developer NXP Semiconductors Germany GmbH

References

Outgoing
  • BSI-DSZ-CC-0977-2017 - archived - NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software
Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
Key Exchange
Libraries
Crypto Library ..................................................15

Vendor
NXP Semiconductors, NXP

Security level
EAL6, EAL 6, EAL6+, EAL4+, EAL4, EAL6 augmented, EAL 6 augmented
Claims
O.RSA, O.ECDSA, O.ECC_DHKE, O.SHA
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FCS_COP, FCS_CKM, FCS_CKM.4, FCS_COP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4.1, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FDP_RIP.1, FDP_ITT.1, FPT_ITT.1, FPT_FLS.1, FRU_FLT.2
Protection profiles
BSI-PP-0084-2014
Certificates
BSI-DSZ-CC-1019

Side-channel analysis
Leak-Inherent, DPA, timing attacks, template attacks, Malfunction, malfunction, DFA

Standards
FIPS 180-4, FIPS 186-4, PKCS #1, ISO/IEC 15946-2, ISO/IEC 15946-3, ISO/IEC 15946-1, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title Crypto Library Cobalt Security Target Lite
Subject Crypto Library Cobalt on N7021 VA
Keywords Common Criteria, Security Target Lite, Crypto Library Cobalt, EAL6+, N7021 VA
Author NXP Semiconductors
Creation date D:20171212162609+01'00'
Modification date D:20171212171615+01'00'
Pages 36
Creator DITA Open Toolkit
Producer Apache FOP Version 1.1

References

Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-1019-2017

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ALC_CMC.5, ATE_IND.2, ADV_IMP.2, ADV_ARC.1, ATE_FUN.2, ASE_SPD.1, ASE_REQ.2, ASE_TSS.2, AGD_OPE.1, ATE_COV.3, ALC_TAT.3, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ASE_INT.1, ADV_TDS.5, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2

Similar certificates

Name Certificate ID
Crypto Library Cobalt on N7021 VA BSI-DSZ-CC-1019-V2-2019 Compare

References ?

Updates ?

  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BAROC_SC_PP_V1.0', 'JAVA_OC', 'SECURITY_IC_AUGP_V1.0']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f5431a78f90d400bf0edfef96155c8f58076540d3e0ded7561229c340dab25b6', 'txt_hash': '7d4761da855d950d9d267e7faeb4f1a99676b91a68d9ceefc562ce7d2cd8a994'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7935971621d0713a543dae56c54753f9aac61a6df5b5cb8434edfa6d3a0eaf0f', 'txt_hash': '778dc38350bc1a50682c1dfc7a74556393d410f1e2a5db546aecc901f7cae139'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1007137, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 30, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20171205110617+01'00'", '/Creator': 'Writer', '/Keywords': 'Common Criteria, Certification, Zertifizierung, Smart Card, Crypto Library Cobalt on N7021 VA, NXP Semiconductors Germany GmbH', '/ModDate': "D:20171207110049+01'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-1019-2017', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.sogisportal.eu/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 219892, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 36, '/Author': 'NXP Semiconductors', '/CreationDate': "D:20171212162609+01'00'", '/Creator': 'DITA Open Toolkit', '/Keywords': 'Common Criteria, Security Target Lite, Crypto Library Cobalt, EAL6+, N7021 VA', '/ModDate': "D:20171212171615+01'00'", '/PDFVersion': '1.4', '/Producer': 'Apache FOP Version 1.1', '/Subject': 'Crypto Library Cobalt on N7021 VA', '/Title': 'Crypto Library Cobalt Security Target Lite', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1019-2017', 'cert_item': 'Crypto Library Cobalt on N7021 VA', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2 and ALC_FLR.1'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1019-2017': 15, 'BSI-DSZ-CC-1019': 2, 'BSI-DSZ-CC-0977-2017': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 4}}, 'cc_security_level': {'EAL': {'EAL 6': 5, 'EAL 5': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 4': 1, 'EAL 2+': 1, 'EAL 5+': 1, 'EAL 6 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 4, 'ALC_FLR': 3, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_FUN': 1, 'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 6}, 'R': {'R.O': 6}}, 'vendor': {'NXP': {'NXP Semiconductors': 17, 'NXP': 9}}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 5}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 2}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 9}}, 'FF': {'DH': {'Diffie-Hellman': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-224': 3, 'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 3}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side-channel': 1, 'DPA': 2, 'SPA': 1}, 'FI': {'fault injection': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 1, 'FIPS PUB 180-4': 1}, 'PKCS': {'PKCS #1': 1}, 'BSI': {'AIS 34': 2, 'AIS 36': 4, 'AIS 25': 2, 'AIS 26': 2, 'AIS 37': 2, 'AIS 35': 2, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 20': 1, 'AIS 23': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 38': 1, 'AIS 41': 1, 'AIS 46': 1, 'AIS 47': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Cobalt on N7021 VA Security Target, BSI-DSZ-CC-1019, Version 1.2, 5 July 2017, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 2, 20 October 2017, EVALUATION TECHNICAL REPORT SUMMARY': 1, 'SUMMARY), TÃœV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January': 1, 'EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), TÃœV Informationstechnik GmbH (confidential document) [11] Configuration lists for the TOE: • Version 1.3, 07 March 2017, Crypto Library Iron / Cobalt': 1, '0 on N7021 VA, Life Cycle (confidential document) • Version 1.0, 07 March 2017, P71D320 Crypto Library, Configuration Item List, Evaluation': 1, 'confidential document) [12] Guidance documentation for the TOE: • Version 1.7, 19 April 2017, Crypto Library Cobalt V1.0': 1, 'N7021 VA Information on Guidance and Operation (confidential document) • Version 1.2, 19 January 2017, N7021 Crypto Library ECC over GF(p) Library (confidential document': 1, '• Version 1.0, 29 September 2016, N7021 Crypto Library HASH Library (confidential document) • Version 1.3, 12 April 2017, N7021 Crypto Library RSA Library (confidential document) • Version 1': 1, '16 September 2016, N7021 Crypto Library RSA Key Generation Library (confidential document) • AIS 34, Version 3, Evaluation Methodology for CC Assurance Classes for EAL 5+ (CCv2.3 & CCv3.1': 1, 'Report BSI-DSZ-CC-1019-2017 • Version 1.0, 29 September 2016, N7021 Crypto Library SHA Library (confidential document) • Version 1.0, 28 November 2016, N7021 Crypto Library UtilsAsym Library (confidential document': 1, 'for Composite Evaluation for the N7021 VA, Version 2, 30 June 2017, TÃœV Informationstechnik GmbH (confidential document) [15] NXP Secure Smart Card Controller N7021 VA Security Target Lite, BSI-DSZ-CC- 0977-2017': 1, 'family N7021 Wafer and delivery specification, Version 1.1, 05 August 2016, NXP Semiconductors (confidential document) 26 / 31 BSI-DSZ-CC-1019-2017 Certification Report C. Excerpts from the Criteria For the meaning': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1019': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6': 32, 'EAL 6': 1, 'EAL6+': 6, 'EAL4+': 2, 'EAL4': 1, 'EAL6 augmented': 2, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 2, 'ADV_IMP.2': 2, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 3, 'ALC_CMC.5': 2, 'ALC_CMS.5': 2, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 3}, 'ASE': {'ASE_TSS.2': 3, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FCS': {'FCS_COP': 25, 'FCS_CKM': 8, 'FCS_CKM.4': 14, 'FCS_COP.1': 8, 'FCS_CKM.1': 11, 'FCS_CKM.2': 2, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ITC.1': 8, 'FDP_ITC.2': 8, 'FDP_IFC.1': 8, 'FDP_RIP.1': 9, 'FDP_ITT.1': 1}, 'FPT': {'FPT_ITT.1': 8, 'FPT_FLS.1': 8}, 'FRU': {'FRU_FLT.2': 8}}, 'cc_claims': {'O': {'O.RSA': 5, 'O.ECDSA': 5, 'O.ECC_DHKE': 4, 'O.SHA': 5}}, 'vendor': {'NXP': {'NXP Semiconductors': 17, 'NXP': 49}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 2}, 'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 21}, 'ECC': {'ECC': 33}}, 'FF': {'DH': {'Diffie-Hellman': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-224': 8, 'SHA-256': 8, 'SHA-384': 8, 'SHA-512': 8}}}, 'crypto_scheme': {'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library ..................................................15': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'DPA': 3, 'timing attacks': 2, 'template attacks': 2}, 'FI': {'Malfunction': 1, 'malfunction': 1, 'DFA': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 180-4': 2, 'FIPS 186-4': 2}, 'PKCS': {'PKCS #1': 8}, 'ISO': {'ISO/IEC 15946-2': 2, 'ISO/IEC 15946-3': 1, 'ISO/IEC 15946-1': 2}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 1019a_pdf.pdf.
    • The st_filename property was set to 1019b_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1019-2017.
    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['21.0.03/TSE-CCCS-59']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['21.0.03/TSE-CCCS-59']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1019-V2-2019']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1019-V2-2019']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0977-2017']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0977-2017']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1019a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1019b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Crypto Library Cobalt on N7021 VA was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "490f7a35d49fbf8c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1019-2017",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1019-V2-2019"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0977-2017"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1019-V2-2019"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0977-2017"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "21.0.03/TSE-CCCS-59"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "21.0.03/TSE-CCCS-59"
        ]
      },
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH Business Line Identification",
  "manufacturer_web": "https://www.nxp.com",
  "name": "Crypto Library Cobalt on N7021 VA",
  "not_valid_after": "2022-11-24",
  "not_valid_before": "2017-11-24",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "1019a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2 and ALC_FLR.1",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1019-2017",
        "cert_item": "Crypto Library Cobalt on N7021 VA",
        "cert_lab": "BSI",
        "developer": "NXP Semiconductors Germany GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 9
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 3
          }
        },
        "RSA": {
          "RSA-CRT": 2
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0977-2017": 1,
          "BSI-DSZ-CC-1019": 2,
          "BSI-DSZ-CC-1019-2017": 15
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 6
        },
        "R": {
          "R.O": 6
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 4
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 3,
          "ALC_FLR.1": 4,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_TSS.2": 4
        },
        "ATE": {
          "ATE_COV.3": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 1,
          "EAL 5": 4,
          "EAL 5+": 1,
          "EAL 6": 5,
          "EAL 6 augmented": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "0 on N7021 VA, Life Cycle (confidential document) \u2022 Version 1.0, 07 March 2017, P71D320 Crypto Library, Configuration Item List, Evaluation": 1,
          "16 September 2016, N7021 Crypto Library RSA Key Generation Library (confidential document) \u2022 AIS 34, Version 3, Evaluation Methodology for CC Assurance Classes for EAL 5+ (CCv2.3 \u0026 CCv3.1": 1,
          "Cobalt on N7021 VA Security Target, BSI-DSZ-CC-1019, Version 1.2, 5 July 2017, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, Version 2, 20 October 2017, EVALUATION TECHNICAL REPORT SUMMARY": 1,
          "EVALUATION TECHNICAL REPORT FOR COMPOSITE EVALUATION (ETR COMP), T\u00dcV Informationstechnik GmbH (confidential document) [11] Configuration lists for the TOE: \u2022 Version 1.3, 07 March 2017, Crypto Library Iron / Cobalt": 1,
          "N7021 VA Information on Guidance and Operation (confidential document) \u2022 Version 1.2, 19 January 2017, N7021 Crypto Library ECC over GF(p) Library (confidential document": 1,
          "Report BSI-DSZ-CC-1019-2017 \u2022 Version 1.0, 29 September 2016, N7021 Crypto Library SHA Library (confidential document) \u2022 Version 1.0, 28 November 2016, N7021 Crypto Library UtilsAsym Library (confidential document": 1,
          "SUMMARY), T\u00dcV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "confidential document) [12] Guidance documentation for the TOE: \u2022 Version 1.7, 19 April 2017, Crypto Library Cobalt V1.0": 1,
          "family N7021 Wafer and delivery specification, Version 1.1, 05 August 2016, NXP Semiconductors (confidential document) 26 / 31 BSI-DSZ-CC-1019-2017 Certification Report C. Excerpts from the Criteria For the meaning": 1,
          "for Composite Evaluation for the N7021 VA, Version 2, 30 June 2017, T\u00dcV Informationstechnik GmbH (confidential document) [15] NXP Secure Smart Card Controller N7021 VA Security Target Lite, BSI-DSZ-CC- 0977-2017": 1,
          "\u2022 Version 1.0, 29 September 2016, N7021 Crypto Library HASH Library (confidential document) \u2022 Version 1.3, 12 April 2017, N7021 Crypto Library RSA Library (confidential document) \u2022 Version 1": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 5
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-224": 3,
            "SHA-256": 3,
            "SHA-384": 3,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 1,
          "side-channel": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 14": 1,
          "AIS 19": 1,
          "AIS 20": 1,
          "AIS 23": 1,
          "AIS 25": 2,
          "AIS 26": 2,
          "AIS 31": 1,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 4,
          "AIS 37": 2,
          "AIS 38": 1,
          "AIS 41": 1,
          "AIS 46": 1,
          "AIS 47": 1
        },
        "FIPS": {
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "PKCS": {
          "PKCS #1": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 9,
          "NXP Semiconductors": 17
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20171205110617+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, Smart Card, Crypto Library Cobalt on N7021 VA, NXP Semiconductors Germany GmbH",
      "/ModDate": "D:20171207110049+01\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-1019-2017",
      "pdf_file_size_bytes": 1007137,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.sogisportal.eu/",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierungsreporte"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 30
    },
    "st_filename": "1019b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 33
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 21
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 5
          }
        },
        "RSA": {
          "RSA-CRT": 2
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1019": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.ECC_DHKE": 4,
          "O.ECDSA": 5,
          "O.RSA": 5,
          "O.SHA": 5
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.5": 2,
          "ADV_IMP.2": 2,
          "ADV_INT.3": 1,
          "ADV_SPM.1": 2,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.5": 2,
          "ALC_CMS.5": 2,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.2": 3
        },
        "ATE": {
          "ATE_COV.3": 2,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL4": 1,
          "EAL4+": 2,
          "EAL6": 32,
          "EAL6 augmented": 2,
          "EAL6+": 6
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 8,
          "FCS_CKM.1": 11,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 14,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 25,
          "FCS_COP.1": 8
        },
        "FDP": {
          "FDP_IFC.1": 8,
          "FDP_ITC.1": 8,
          "FDP_ITC.2": 8,
          "FDP_ITT.1": 1,
          "FDP_RIP.1": 9
        },
        "FPT": {
          "FPT_FLS.1": 8,
          "FPT_ITT.1": 8
        },
        "FRU": {
          "FRU_FLT.2": 8
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library ..................................................15": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          },
          "SHA2": {
            "SHA-224": 8,
            "SHA-256": 8,
            "SHA-384": 8,
            "SHA-512": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "DFA": 3,
          "Malfunction": 1,
          "malfunction": 1
        },
        "SCA": {
          "DPA": 3,
          "Leak-Inherent": 1,
          "template attacks": 2,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-002": 2,
          "CCMB-2012-09-003": 2,
          "CCMB-2012-09-004": 2
        },
        "FIPS": {
          "FIPS 180-4": 2,
          "FIPS 186-4": 2
        },
        "ISO": {
          "ISO/IEC 15946-1": 2,
          "ISO/IEC 15946-2": 2,
          "ISO/IEC 15946-3": 1
        },
        "PKCS": {
          "PKCS #1": 8
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 49,
          "NXP Semiconductors": 17
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP Semiconductors",
      "/CreationDate": "D:20171212162609+01\u002700\u0027",
      "/Creator": "DITA Open Toolkit",
      "/Keywords": "Common Criteria, Security Target Lite, Crypto Library Cobalt, EAL6+, N7021 VA",
      "/ModDate": "D:20171212171615+01\u002700\u0027",
      "/PDFVersion": "1.4",
      "/Producer": "Apache FOP Version 1.1",
      "/Subject": "Crypto Library Cobalt on N7021 VA",
      "/Title": "Crypto Library Cobalt Security Target Lite",
      "pdf_file_size_bytes": 219892,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 36
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "BAROC_SC_PP_V1.0",
            "JAVA_OC",
            "SECURITY_IC_AUGP_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
        "pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1019a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL6+",
      "ALC_FLR.1",
      "ASE_TSS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1019b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f5431a78f90d400bf0edfef96155c8f58076540d3e0ded7561229c340dab25b6",
      "txt_hash": "7d4761da855d950d9d267e7faeb4f1a99676b91a68d9ceefc562ce7d2cd8a994"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7935971621d0713a543dae56c54753f9aac61a6df5b5cb8434edfa6d3a0eaf0f",
      "txt_hash": "778dc38350bc1a50682c1dfc7a74556393d410f1e2a5db546aecc901f7cae139"
    }
  },
  "status": "archived"
}