Crypto Library V1.0 on P60x080/052/040yVC(Y/Z/A)/yVG
CSV information ?
Status | archived |
---|---|
Valid from | 12.01.2017 |
Valid until | 12.01.2022 |
Scheme | 🇳🇱 NL |
Manufacturer | NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL6+, ALC_FLR.1, ASE_TSS.2 |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, 3DES, CBC-MACAsymmetric Algorithms
ECDH, ECDSA, ECCHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512Randomness
PRNGEngines
SmartMX2Block cipher modes
ECB, CBCVendor
NXP Semiconductors, NXPSecurity level
EAL4, EAL6, EAL6+, EAL 6, EAL6 augmented, EAL 6 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, AVA_VAN, ASE_TSS.2Protection profiles
BSI-PP-0035Certificates
BSI-DSZ-CC-0837-, NSCIB-CC-15-84058-CR, NSCIB-CC-15-84058Evaluation facilities
Riscure, TÃœV InformationstechnikSide-channel analysis
side channel, SPA, DPA, timing attacks, DFA, fault injection, JIL, JHASCertification process
out of scope, hardware architecture of the platforms only differ in the memory size and availability of Mifare (out of scope of this evaluation). 2.6.4 Testing Results The testing activities, including configurationsFile metadata
Title | Certification Report NSCIB-CC-15-84058-CR.doc |
---|---|
Creation date | D:20170117120137+01'00' |
Pages | 16 |
Creator | pdfFactory Pro www.pdffactory.com |
Producer | pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch) |
Frontpage
Certificate ID | NSCIB-CC-15-84058-CR |
---|---|
Certified item | Crypto Library V1.0 on P60x080/052/040yVC(Y/Z/A)/yVG |
Certification lab | Riscure |
Developer | NXP Semiconductors GmbH |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, DEA, Triple-DES, 3DES, TDES, CBC-MAC, CMACAsymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA512Schemes
MAC, Key ExchangeRandomness
TRNG, RNG, RNDEngines
SmartMX2Libraries
Crypto LibraryBlock cipher modes
ECB, CBCVendor
NXP Semiconductors, NXP Semiconductors N.V, NXPSecurity level
EAL6, EAL 6, EAL6+, EAL4+, EAL4, EAL6 augmented, EAL 6 augmentedClaims
O.RND, O.HW_AES, O.CUST_RECONFIG, O.EEPROM_INTEGRITY, O.FM_FW, O.MEM_ACCESS, O.SFR_ACCESS, O.AES, O.DES, O.RSA, O.ECDSA, O.ECC_DHKE, O.SHA, O.REUSE, O.COPY, O.COMPARE, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_COP.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4.1, FDP_SOP, FDP_IFC, FDP_ITT, FDP_SOP.1, FDP_SOP.1.1, FDP_IFC.1, FDP_ITT.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_RIP, FDP_RIP.1.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FPT_ITT, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FRU_FLT.2Protection profiles
BSI-PP-0035Certificates
NSCIB-CC-15-84058Side-channel analysis
Leak-Inherent, Physical Probing, side-channel, side channel, DPA, SPA, timing attacks, timing attack, Timing attacks, Malfunction, malfunction, DFA, fault injection, JILStandards
FIPS 197, FIPS 180-3, FIPS 180-4, FIPS PUB 197, FIPS PUB 46-3, NIST SP 800-38A, NIST SP 800-38B, PKCS #1, AIS20, AIS31, ISO/IEC 15946-3, ISO/IEC 15946-1, ISO/IEC 15946-2, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | Security Target |
---|---|
Subject | Crypto Library V1.0 on P60x080/052/040yVC(Y/Z/A)/yVG |
Keywords | Security Target, Crypto Library, P60x080/052/040yVC(Y/Z/A)/yVG |
Author | NXP Semiconductors N.V. |
Creation date | D:20161014145836+02'00' |
Pages | 55 |
Creator | DITA Open Toolkit |
Producer | Apache FOP Version 1.1 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5Similar certificates
Name | Certificate ID | |
---|---|---|
Crypto Library V1.0 on P60x080/052/040yVC(Z/A)/yVG | NSCIB-CC-13-37581-CR2 | Compare |
Crypto Library V1.0 on P60x080/052/040PVC(Y/Z/A)/PVG | NSCIB-CC-12-36243-CR2 | Compare |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_V1.0', 'PKISKPP']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c307fe5c8959467af483192cb15e3bddac30afefa5d424b3d16499f777aace06', 'txt_hash': '97e71c3cd09f3536f64638cce92419acb50c4efa810005289a9309e66caa3cfb'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c7554607a9788efc7a1607fff735b1c17dc4f2b82a45238e5e2ac40fef92bb1b', 'txt_hash': 'bc7b2e0cc736e156f1940d4f3ef8807381cb50673876a4657b516b4576b3cdcf'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 333913, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 16, '/CreationDate': "D:20170117120137+01'00'", '/Creator': 'pdfFactory Pro www.pdffactory.com', '/Producer': 'pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch)', '/Title': 'Certification Report NSCIB-CC-15-84058-CR.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.sogisportal.eu', 'http://www.tuv.com/nl', 'http://www.commoncriteriaportal.org']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 398977, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 55, '/Title': 'Security Target', '/Author': 'NXP Semiconductors N.V.', '/Subject': 'Crypto Library V1.0 on P60x080/052/040yVC(Y/Z/A)/yVG', '/Keywords': 'Security Target, Crypto Library,\n P60x080/052/040yVC(Y/Z/A)/yVG', '/Creator': 'DITA Open Toolkit', '/Producer': 'Apache FOP Version 1.1', '/CreationDate': "D:20161014145836+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'NL': {'cert_id': 'NSCIB-CC-15-84058-CR', 'cert_item': 'Crypto Library V1.0 on P60x080/052/040yVC(Y/Z/A)/yVG', 'developer': 'NXP Semiconductors GmbH', 'cert_lab': ' Riscure'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0837-': 1}, 'NL': {'NSCIB-CC-15-84058-CR': 15, 'NSCIB-CC-15-84058': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL6': 1, 'EAL6+': 1, 'EAL 6': 1, 'EAL6 augmented': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 2}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP Semiconductors': 3, 'NXP': 17}}, 'eval_facility': {'Riscure': {'Riscure': 5}, 'TUV': {'TÃœV Informationstechnik': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'DES': {'DES': 5}, '3DES': {'Triple-DES': 3, '3DES': 3}}, 'constructions': {'MAC': {'CBC-MAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 14}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-224': 3, 'SHA-256': 4, 'SHA-384': 3, 'SHA-512': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'PRNG': 1}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 25}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 2, 'SPA': 1, 'DPA': 1, 'timing attacks': 2}, 'FI': {'DFA': 2, 'fault injection': 1}, 'other': {'JIL': 5, 'JHAS': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'hardware architecture of the platforms only differ in the memory size and availability of Mifare (out of scope of this evaluation). 2.6.4 Testing Results The testing activities, including configurations': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'NL': {'NSCIB-CC-15-84058': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL6': 30, 'EAL 6': 2, 'EAL6+': 4, 'EAL4+': 2, 'EAL4': 1, 'EAL6 augmented': 2, 'EAL 6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 2, 'ADV_IMP.2': 2, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 3, 'ALC_CMC.5': 2, 'ALC_CMS.5': 2, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 2}, 'FCS': {'FCS_COP.1': 46, 'FCS_RNG.1': 18, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 1, 'FCS_CKM.1': 20, 'FCS_CKM.4': 16, 'FCS_COP.1.1': 9, 'FCS_CKM.1.1': 2, 'FCS_CKM.2': 2, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_SOP': 7, 'FDP_IFC': 1, 'FDP_ITT': 1, 'FDP_SOP.1': 13, 'FDP_SOP.1.1': 3, 'FDP_IFC.1': 7, 'FDP_ITT.1': 6, 'FDP_ACC.1': 6, 'FDP_ACF.1': 5, 'FDP_RIP.1': 6, 'FDP_ITC.1': 11, 'FDP_ITC.2': 11, 'FDP_RIP': 1, 'FDP_RIP.1.1': 1}, 'FMT': {'FMT_LIM.1': 2, 'FMT_LIM.2': 2, 'FMT_MSA.3': 5, 'FMT_MSA.1': 5, 'FMT_SMF.1': 3}, 'FPT': {'FPT_ITT': 1, 'FPT_FLS.1': 6, 'FPT_ITT.1': 6, 'FPT_PHP.3': 6}, 'FRU': {'FRU_FLT.2': 6}}, 'cc_claims': {'O': {'O.RND': 12, 'O.HW_AES': 4, 'O.CUST_RECONFIG': 3, 'O.EEPROM_INTEGRITY': 2, 'O.FM_FW': 3, 'O.MEM_ACCESS': 3, 'O.SFR_ACCESS': 3, 'O.AES': 5, 'O.DES': 4, 'O.RSA': 5, 'O.ECDSA': 5, 'O.ECC_DHKE': 4, 'O.SHA': 5, 'O.REUSE': 6, 'O.COPY': 1, 'O.COMPARE': 1}, 'T': {'T.RND': 5}}, 'vendor': {'NXP': {'NXP Semiconductors': 18, 'NXP Semiconductors N.V': 54, 'NXP': 19}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 36}}, 'DES': {'DES': {'DES': 42, 'DEA': 1}, '3DES': {'Triple-DES': 13, '3DES': 8, 'TDES': 5}}, 'constructions': {'MAC': {'CBC-MAC': 12, 'CMAC': 10}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 1}, 'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 26}, 'ECC': {'ECC': 46}}, 'FF': {'DH': {'Diffie-Hellman': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 10}, 'SHA2': {'SHA-224': 8, 'SHA-256': 8, 'SHA-384': 8, 'SHA-512': 9, 'SHA512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 45, 'RND': 18}}, 'cipher_mode': {'ECB': {'ECB': 11}, 'CBC': {'CBC': 16}}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 136}}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library ': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 7, 'Physical Probing': 2, 'side-channel': 1, 'side channel': 14, 'DPA': 6, 'SPA': 3, 'timing attacks': 7, 'timing attack': 1, 'Timing attacks': 1}, 'FI': {'Malfunction': 12, 'malfunction': 2, 'DFA': 5, 'fault injection': 1}, 'other': {'JIL': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 1, 'FIPS 180-3': 1, 'FIPS 180-4': 1, 'FIPS PUB 197': 1, 'FIPS PUB 46-3': 1}, 'NIST': {'NIST SP 800-38A': 1, 'NIST SP 800-38B': 1}, 'PKCS': {'PKCS #1': 8}, 'BSI': {'AIS20': 1, 'AIS31': 1}, 'ISO': {'ISO/IEC 15946-3': 1, 'ISO/IEC 15946-1': 4, 'ISO/IEC 15946-2': 1}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
[CR] NSCIB-CC-15-84058-CR.pdf
. - The st_filename property was set to
[ST] Smx2Cl_ST_P60x080yVC_yVG_V_1_11.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['']
. - The cert_id property was set to
NSCIB-CC-15-84058-CR
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-15-84058-CR.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20Smx2Cl_ST_P60x080yVC_yVG_V_1_11.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Crypto Library V1.0 on P60x080/052/040yVC(Y/Z/A)/yVG was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "4c4871d2599ba22e",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-15-84058-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity",
"manufacturer_web": "https://www.nxp.com",
"name": "Crypto Library V1.0 on P60x080/052/040yVC(Y/Z/A)/yVG",
"not_valid_after": "2022-01-12",
"not_valid_before": "2017-01-12",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "[CR] NSCIB-CC-15-84058-CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-15-84058-CR",
"cert_item": "Crypto Library V1.0 on P60x080/052/040yVC(Y/Z/A)/yVG",
"cert_lab": " Riscure",
"developer": "NXP Semiconductors GmbH"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 14
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 6
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0837-": 1
},
"NL": {
"NSCIB-CC-15-84058": 1,
"NSCIB-CC-15-84058-CR": 15
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR.1": 2
},
"ASE": {
"ASE_TSS.2": 2
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 1,
"EAL 6 augmented": 1,
"EAL4": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"hardware architecture of the platforms only differ in the memory size and availability of Mifare (out of scope of this evaluation). 2.6.4 Testing Results The testing activities, including configurations": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX2": 25
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Riscure": {
"Riscure": 5
},
"TUV": {
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 4,
"SHA-384": 3,
"SHA-512": 4
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"fault injection": 1
},
"SCA": {
"DPA": 1,
"SPA": 1,
"side channel": 2,
"timing attacks": 2
},
"other": {
"JHAS": 1,
"JIL": 5
}
},
"standard_id": {},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"3DES": {
"3DES": 3,
"Triple-DES": 3
},
"DES": {
"DES": 5
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 17,
"NXP Semiconductors": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20170117120137+01\u002700\u0027",
"/Creator": "pdfFactory Pro www.pdffactory.com",
"/Producer": "pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch)",
"/Title": "Certification Report NSCIB-CC-15-84058-CR.doc",
"pdf_file_size_bytes": 333913,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.sogisportal.eu",
"http://www.commoncriteriaportal.org",
"http://www.tuv.com/nl",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 16
},
"st_filename": "[ST] Smx2Cl_ST_P60x080yVC_yVG_V_1_11.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 46
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 26
}
},
"FF": {
"DH": {
"Diffie-Hellman": 6
}
},
"RSA": {
"RSA-CRT": 1
}
},
"cc_cert_id": {
"NL": {
"NSCIB-CC-15-84058": 2
}
},
"cc_claims": {
"O": {
"O.AES": 5,
"O.COMPARE": 1,
"O.COPY": 1,
"O.CUST_RECONFIG": 3,
"O.DES": 4,
"O.ECC_DHKE": 4,
"O.ECDSA": 5,
"O.EEPROM_INTEGRITY": 2,
"O.FM_FW": 3,
"O.HW_AES": 4,
"O.MEM_ACCESS": 3,
"O.REUSE": 6,
"O.RND": 12,
"O.RSA": 5,
"O.SFR_ACCESS": 3,
"O.SHA": 5
},
"T": {
"T.RND": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.5": 2,
"ADV_IMP.2": 2,
"ADV_INT.3": 1,
"ADV_SPM.1": 1,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.5": 2,
"ALC_CMS.5": 2,
"ALC_DEL.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR.1": 3,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.2": 4
},
"ATE": {
"ATE_COV.3": 2,
"ATE_DPT.3": 1,
"ATE_FUN.2": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 2,
"EAL 6 augmented": 2,
"EAL4": 1,
"EAL4+": 2,
"EAL6": 30,
"EAL6 augmented": 2,
"EAL6+": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 2
},
"FCS": {
"FCS_CKM.1": 20,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 2,
"FCS_CKM.4": 16,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 46,
"FCS_COP.1.1": 9,
"FCS_RNG.1": 18,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC.1": 6,
"FDP_ACF.1": 5,
"FDP_IFC": 1,
"FDP_IFC.1": 7,
"FDP_ITC.1": 11,
"FDP_ITC.2": 11,
"FDP_ITT": 1,
"FDP_ITT.1": 6,
"FDP_RIP": 1,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1,
"FDP_SOP": 7,
"FDP_SOP.1": 13,
"FDP_SOP.1.1": 3
},
"FMT": {
"FMT_LIM.1": 2,
"FMT_LIM.2": 2,
"FMT_MSA.1": 5,
"FMT_MSA.3": 5,
"FMT_SMF.1": 3
},
"FPT": {
"FPT_FLS.1": 6,
"FPT_ITT": 1,
"FPT_ITT.1": 6,
"FPT_PHP.3": 6
},
"FRU": {
"FRU_FLT.2": 6
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 16
},
"ECB": {
"ECB": 11
}
},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX2": 136
}
},
"crypto_library": {
"Generic": {
"Crypto Library ": 1
}
},
"crypto_protocol": {},
"crypto_scheme": {
"KEX": {
"Key Exchange": 2
},
"MAC": {
"MAC": 2
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 10
},
"SHA2": {
"SHA-224": 8,
"SHA-256": 8,
"SHA-384": 8,
"SHA-512": 9,
"SHA512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 18,
"RNG": 45
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 5,
"Malfunction": 12,
"fault injection": 1,
"malfunction": 2
},
"SCA": {
"DPA": 6,
"Leak-Inherent": 7,
"Physical Probing": 2,
"SPA": 3,
"Timing attacks": 1,
"side channel": 14,
"side-channel": 1,
"timing attack": 1,
"timing attacks": 7
},
"other": {
"JIL": 3
}
},
"standard_id": {
"BSI": {
"AIS20": 1,
"AIS31": 1
},
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
},
"FIPS": {
"FIPS 180-3": 1,
"FIPS 180-4": 1,
"FIPS 197": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1
},
"ISO": {
"ISO/IEC 15946-1": 4,
"ISO/IEC 15946-2": 1,
"ISO/IEC 15946-3": 1
},
"NIST": {
"NIST SP 800-38A": 1,
"NIST SP 800-38B": 1
},
"PKCS": {
"PKCS #1": 8
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 36
}
},
"DES": {
"3DES": {
"3DES": 8,
"TDES": 5,
"Triple-DES": 13
},
"DES": {
"DEA": 1,
"DES": 42
}
},
"constructions": {
"MAC": {
"CBC-MAC": 12,
"CMAC": 10
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 19,
"NXP Semiconductors": 18,
"NXP Semiconductors N.V": 54
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "NXP Semiconductors N.V.",
"/CreationDate": "D:20161014145836+02\u002700\u0027",
"/Creator": "DITA Open Toolkit",
"/Keywords": "Security Target, Crypto Library,\n P60x080/052/040yVC(Y/Z/A)/yVG",
"/Producer": "Apache FOP Version 1.1",
"/Subject": "Crypto Library V1.0 on P60x080/052/040yVC(Y/Z/A)/yVG",
"/Title": "Security Target",
"pdf_file_size_bytes": 398977,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 55
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"SECURITY_IC_V1.0",
"PKISKPP"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf",
"pp_name": "Security IC Platform Protection Profile, Version 1.0"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-15-84058-CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ASE_TSS.2",
"EAL6+",
"ALC_FLR.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20Smx2Cl_ST_P60x080yVC_yVG_V_1_11.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c307fe5c8959467af483192cb15e3bddac30afefa5d424b3d16499f777aace06",
"txt_hash": "97e71c3cd09f3536f64638cce92419acb50c4efa810005289a9309e66caa3cfb"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c7554607a9788efc7a1607fff735b1c17dc4f2b82a45238e5e2ac40fef92bb1b",
"txt_hash": "bc7b2e0cc736e156f1940d4f3ef8807381cb50673876a4657b516b4576b3cdcf"
}
},
"status": "archived"
}