NXP JCOP 5.2 on SN100.C58 Secure Element

CSV information ?

Status active
Valid from 14.06.2021
Valid until 14.06.2026
Scheme 🇳🇱 NL
Manufacturer NXP Semiconductors
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL5+, ALC_FLR.1, ALC_DVS.2, ASE_TSS.2, AVA_VAN.5
Maintenance updates The changes to the certified product are related to the addition of a new production site for the SN100, which is the certified platform that is part of this composite TOE. The identification of the maintained product is retained as NXP JCOP 5.2 on SN100.C58 Secure Element. (18.08.2021) Certification report Security target
The changes to the certified product are related to a minor change in the software not impacting the security functionality of the certified product. The identification of the maintained TOE remains as NXP JCOP 5.2 on SN100.C58 Secure Element, and the configuration “JCOP 5.2 R3.01.1-1” has been added (20.08.2021) Certification report Security target
The changes to the certified product are related to a minor change in the software not impacting the security functionality of the certified product. The identification of the maintained product is modified to NXP JCOP 5.2 on SN100.C58 Secure Element, and the configuration “JCOP 5.2 R3.01.1-2” has been added. (30.11.2021) Certification report Security target

Heuristics summary ?

Certificate ID: NSCIB-CC-0023577-CR3

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, HMAC, CMAC, CBC-MAC
Asymmetric Algorithms
ECDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Block cipher modes
ECB, CBC, GCM

JavaCard versions
Java Card 3.0.5
Operating System name
JCOP 5, JCOP5, JCOP 6
Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL5, EAL5+, EAL 5, EAL5 augmented, EAL 5 augmented
Security Assurance Requirements (SAR)
ADV_IMP, AGD_UGM, ALC_DVS.2, ALC_FLR.1, AVA_VAN.5, AVA_VAN, ASE_TSS.2
Protection profiles
BSI-CC-PP-0099-2017, BSI-CC-PP-0100-2018, BSI-CC-PP-0104-2019
Certificates
NSCIB-CC-0023577-CR3, NSCIB-CC-0023577, CC-195714-CR2, NSCIB-CC-221699-CR2, CC-21-174263
Evaluation facilities
Brightsight

Side-channel analysis
side-channel, JIL-AM, JIL, JIL-AAPS

Standards
AIS 20

File metadata

Title Certification Report
Author Denise Cater
Creation date D:20210614154211+01'00'
Modification date D:20210615092418+02'00'
Pages 18
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Frontpage

Certificate ID NSCIB-CC-0023577-CR3
Certified item NXP JCOP 5.2 on SN100.C58 Secure Element
Certification lab Brightsight B.V.
Developer NXP Semiconductors Germany GmbH

Security target ?

Heuristics ?

Certificate ID: NSCIB-CC-0023577-CR3

Extracted SARs

ASE_TSS.2, ALC_DVS.2, ALC_FLR.1, AVA_VAN.5

References ?

No references are available for this certificate.

Updates ?

  • 21.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP JCOP 5.2 on SN100.C58 Secure Element was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB%20certificate%2021-0023577.pdf",
  "dgst": "527b54d640cc5783",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-0023577-CR3",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.2"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2021-11-30",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0023577-3M3-1.0.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0023577_3M3-STLite.pdf",
        "maintenance_title": "The changes to the certified product are related to a minor change in the software not impacting the security functionality of the certified product. The identification of the maintained product is modified to NXP JCOP 5.2 on SN100.C58 Secure Element, and the configuration \u201cJCOP 5.2 R3.01.1-2\u201d has been added."
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2021-08-20",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0023577-3MA2.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0023577_3m2-STLite.pdf",
        "maintenance_title": "The changes to the certified product are related to a minor change in the software not impacting the security functionality of the certified product. The identification of the maintained TOE remains as NXP JCOP 5.2 on SN100.C58 Secure Element, and the configuration \u201cJCOP 5.2 R3.01.1-1\u201d has been added"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2021-08-18",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0023577-3MA1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0023577-3m1-STLite.pdf",
        "maintenance_title": "The changes to the certified product are related to the addition of a new production site for the SN100, which is the certified platform that is part of this composite TOE. The identification of the maintained product is retained as NXP JCOP 5.2 on SN100.C58 Secure Element."
      }
    ]
  },
  "manufacturer": "NXP Semiconductors",
  "manufacturer_web": "https://www.nxp.com/",
  "name": "NXP JCOP 5.2 on SN100.C58 Secure Element",
  "not_valid_after": "2026-06-14",
  "not_valid_before": "2021-06-14",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "NSCIB-CC-0023577-CR3.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-0023577-CR3",
        "cert_item": "NXP JCOP 5.2 on SN100.C58 Secure Element",
        "cert_lab": " Brightsight B.V.",
        "developer": "NXP Semiconductors Germany GmbH"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDSA": {
            "ECDSA": 2
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "CC-195714-CR2": 1,
          "CC-21-174263": 1,
          "NSCIB-CC-0023577": 1,
          "NSCIB-CC-0023577-CR3": 18,
          "NSCIB-CC-221699-CR2": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-2017": 1,
          "BSI-CC-PP-0100-2018": 1,
          "BSI-CC-PP-0104-2019": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_IMP": 1
        },
        "AGD": {
          "AGD_UGM": 1
        },
        "ALC": {
          "ALC_DVS.2": 2,
          "ALC_FLR.1": 2
        },
        "ASE": {
          "ASE_TSS.2": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL4": 1,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL5+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 2,
            "SHA-384": 2,
            "SHA-512": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.5": 1
        }
      },
      "os_name": {
        "JCOP": {
          "JCOP 5": 62,
          "JCOP 6": 1,
          "JCOP5": 12
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side-channel": 1
        },
        "other": {
          "JIL": 2,
          "JIL-AAPS": 1,
          "JIL-AM": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 3,
            "CMAC": 2,
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 18,
          "NXP Semiconductors": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Denise Cater",
      "/CreationDate": "D:20210614154211+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20210615092418+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 543410,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "http://www.tuv.com/nl",
          "http://www.sogisportal.eu/",
          "mailto:info@nl.tuv.com"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": null,
    "st_frontpage": null,
    "st_keywords": null,
    "st_metadata": null
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf",
        "pp_name": "Java Card Protection Profile - Open Configuration"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0100b_pdf.pdf",
        "pp_name": "Embedded UICC for Consumer Devices Protection Profile"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0104b_pdf.pdf",
        "pp_name": "Cryptographic Service Provider (CSP)"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0023577-CR3.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "ALC_FLR.1",
      "AVA_VAN.5",
      "ASE_TSS.2",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0023577-ST-Lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "aadf551604e23450ed32faa53c9b7c210a8772c81d6e19874b22a84a39ff0dc0",
      "txt_hash": "c4f5aa00e3867098e2a3b1bfc398376ffeb23c4fb345374f642f000c1f1bc0ae"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    }
  },
  "status": "active"
}