This page was not yet optimized for use on mobile devices.
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software
CSV information ?
Status | active |
---|---|
Valid from | 31.07.2019 |
Valid until | 31.07.2024 |
Scheme | 🇩🇪 DE |
Manufacturer | NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ASE_TSS.2, EAL6+, ALC_FLR.1 |
Heuristics summary ?
Certificate ID: BSI-DSZ-CC-0977-V2-2019
Certificate ?
Extracted keywords
Vendor
NXP, NXP SemiconductorsSecurity level
EAL 6, EAL 5, EAL 2, EAL 6 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, ASE_TSS.2Protection profiles
BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-0977-V2-2019Standards
ISO/IEC 15408, ISO/IEC 18045File metadata
Title | Certificate BSI-DSZ-CC-0977-V2-2019 |
---|---|
Subject | Common Criteria Certification |
Keywords | Common Criteria, Certification, Zertifizierung, NXP, N7021VA |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20190805151207+02'00' |
Modification date | D:20190805151334+02'00' |
Pages | 1 |
Creator | Writer |
Producer | LibreOffice 5.2 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, AES-, DES, Triple-DES, TDES, TDEA, CBC-MAC, CMACSchemes
MACRandomness
TRNG, RNGBlock cipher modes
ECB, CBCVendor
NXP, NXP SemiconductorsSecurity level
EAL 6, EAL 5, EAL 2, EAL 1, EAL 4, EAL 2+, EAL 5+, EAL 6 augmentedClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_ATE, ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_IND, AVA_VAN, ASE_TSS.2Protection profiles
BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-0977-V2-2019, BSI-DSZ-CC-0977-2017, BSI-DSZ-CC-0977-Evaluation facilities
TÃœV InformationstechnikCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, N7021 VA Security Target, BSI-DSZ-CC-0977- V2-2019, Version 2.3, 2019-06-04, NXP Semiconductors (confidential document) [7] Evaluation Technical Report N7021 VA, BSI-DSZ-CC-0977-V2, Version 4, 2019-07- 17, TÜV, GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, for the N7021 VA, BSI-DSZ-CC- 0977-V2 version 4, 2019-07-17, TÜV Informationstechnik GmbH (confidential document) 7 specifically • AIS1, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung des, and electrical characteristics, Product data sheet, Version 3.1, 2019-06-04, NXP Semiconductors (confidential document) [12] SmartMX3 N7021 Instruction Set Manual, Objective data sheet addendum, Version 1.4, 2016-09-29, NXP Semiconductors (confidential document) [13] SmartMX3 family N7021 Wafer and delivery specification, Objective wafer specification, 1.3, 2018-05-15, NXP Semiconductors (confidential document) [14] SmartMX3 N7021 Post Delivery Configuration Post Delivery Configuration, Objective data sheet, Version 1.1, 2017-03-22, NXP Semiconductors (confidential document) [15] SmartMX3 N7021 Chip Health Mode Chip Health Mode, Objective data sheet addendum, Version 1.0, NXP Semiconductors (confidential document) [16] SmartMX3 N7021 Peripheral Configuration and Use Peripheral Configuration and Use on the N7021, Objective data sheet addendum, Version 1.4, 2017-11-03, NXP Semiconductors (confidential document) [17] SmartMX3 N7021 MMU configuration & FW interface Access / resource management and security, Data Sheet addendum, Version 1.5, 2017- 11-03, NXP Semiconductors (confidential document) [18] SmartMX3 N7021, Inter-Card Communication Functionality and additional APIs, Objective data, addendum, Version 1.1, 2017-03-09, NXP Semiconductors (confidential document) [19] SmartMX3 N7021 NVM Operate Function, Data Sheet addendum, Version 1.0, 2017-01-13, NXP, confidential document) [20] NXP Secure Smart Card Controller N7021 Information on Guidance and Operation, Guidance and, Manual, Version 1.4, 2019-06-04, NXP Semiconductors (confidential document) [21] SmartMX3 N7021 FlashLoader, Product Data Sheet addendum, Version 1.3, 2018- 08-24, NXP, confidential document) [22] SmartMX3 N7021 Shared OS Libraries Memory, communication and CRC, including guidance and, Objective data sheet addendum, Version 1.2, 2017-11-03, NXP Semiconductors (confidential document) [23] SmartMX3 N7021 NXP System Mode OS Interface UM configuration and applications, Objective data, addendum, Version 1.6, 2017-11-03, NXP Semiconductors (confidential document) [24] Crypto Library V1.0 on N7021 VA Symmetric Cipher Library (SymCfg), User manual, Version 1.2, NXP Semiconductors (confidential document) [25] N7021 Crypto Library RNG Library, Product user manual, Version 1.3, 2017-03-27, NXP, confidential document) [26] N7021 Crypto Library Utils Library, User manual, Version 1.1, 2016-11-28, NXP Semiconductors, VA Information on Guidance and Operation, User manual, Version 2.0, 2018-11-15, NXP Semiconductors (confidential document) [28] Order Entry Form, Version 1.9, 2017-03-27, NXP Semiconductors 26 / 32, Library Iron / Cobalt V1.0 on N7021 VA, Life Cycle, Version 1.3, 2017-03-07, NXP Semiconductors (confidential document) [30] P71D320 Crypto Library, Configuration Item List, Evaluation documentation, Version 1.0, NXP Semiconductors (confidential document) [31] NXP Secure Smart Card Controller 7021 VA Evaluation Reference List, Version 2.2, 2019-07-17, Semiconductors (confidential document) [32] NXP Secure Smart Card Controller N7021, Common Criteria CIL, Version 0.5, 2017-04-06, NXP, confidential document) 27 / 32 Certification Report BSI-DSZ-CC-0977-V2-2019 C. Excerpts from the Criteria For theSide-channel analysis
physical probing, side-channel, DPA, SPA, fault injection, JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, N7021 VA Security Target, BSI-DSZ-CC-0977- V2-2019, Version 2.3, 2019-06-04, NXP Semiconductors (confidential document) [7] Evaluation Technical Report N7021 VA, BSI-DSZ-CC-0977-V2, Version 4, 2019-07- 17, TÜV, GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, for the N7021 VA, BSI-DSZ-CC- 0977-V2 version 4, 2019-07-17, TÜV Informationstechnik GmbH (confidential document) 7 specifically • AIS1, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung des, and electrical characteristics, Product data sheet, Version 3.1, 2019-06-04, NXP Semiconductors (confidential document) [12] SmartMX3 N7021 Instruction Set Manual, Objective data sheet addendum, Version 1.4, 2016-09-29, NXP Semiconductors (confidential document) [13] SmartMX3 family N7021 Wafer and delivery specification, Objective wafer specification, 1.3, 2018-05-15, NXP Semiconductors (confidential document) [14] SmartMX3 N7021 Post Delivery Configuration Post Delivery Configuration, Objective data sheet, Version 1.1, 2017-03-22, NXP Semiconductors (confidential document) [15] SmartMX3 N7021 Chip Health Mode Chip Health Mode, Objective data sheet addendum, Version 1.0, NXP Semiconductors (confidential document) [16] SmartMX3 N7021 Peripheral Configuration and Use Peripheral Configuration and Use on the N7021, Objective data sheet addendum, Version 1.4, 2017-11-03, NXP Semiconductors (confidential document) [17] SmartMX3 N7021 MMU configuration & FW interface Access / resource management and security, Data Sheet addendum, Version 1.5, 2017- 11-03, NXP Semiconductors (confidential document) [18] SmartMX3 N7021, Inter-Card Communication Functionality and additional APIs, Objective data, addendum, Version 1.1, 2017-03-09, NXP Semiconductors (confidential document) [19] SmartMX3 N7021 NVM Operate Function, Data Sheet addendum, Version 1.0, 2017-01-13, NXP, confidential document) [20] NXP Secure Smart Card Controller N7021 Information on Guidance and Operation, Guidance and, Manual, Version 1.4, 2019-06-04, NXP Semiconductors (confidential document) [21] SmartMX3 N7021 FlashLoader, Product Data Sheet addendum, Version 1.3, 2018- 08-24, NXP, confidential document) [22] SmartMX3 N7021 Shared OS Libraries Memory, communication and CRC, including guidance and, Objective data sheet addendum, Version 1.2, 2017-11-03, NXP Semiconductors (confidential document) [23] SmartMX3 N7021 NXP System Mode OS Interface UM configuration and applications, Objective data, addendum, Version 1.6, 2017-11-03, NXP Semiconductors (confidential document) [24] Crypto Library V1.0 on N7021 VA Symmetric Cipher Library (SymCfg), User manual, Version 1.2, NXP Semiconductors (confidential document) [25] N7021 Crypto Library RNG Library, Product user manual, Version 1.3, 2017-03-27, NXP, confidential document) [26] N7021 Crypto Library Utils Library, User manual, Version 1.1, 2016-11-28, NXP Semiconductors, VA Information on Guidance and Operation, User manual, Version 2.0, 2018-11-15, NXP Semiconductors (confidential document) [28] Order Entry Form, Version 1.9, 2017-03-27, NXP Semiconductors 26 / 32, Library Iron / Cobalt V1.0 on N7021 VA, Life Cycle, Version 1.3, 2017-03-07, NXP Semiconductors (confidential document) [30] P71D320 Crypto Library, Configuration Item List, Evaluation documentation, Version 1.0, NXP Semiconductors (confidential document) [31] NXP Secure Smart Card Controller 7021 VA Evaluation Reference List, Version 2.2, 2019-07-17, Semiconductors (confidential document) [32] NXP Secure Smart Card Controller N7021, Common Criteria CIL, Version 0.5, 2017-04-06, NXP, confidential document) 27 / 32 Certification Report BSI-DSZ-CC-0977-V2-2019 C. Excerpts from the Criteria For theStandards
FIPS197, FIPS 197, NIST SP 800-38A, NIST SP 800-67, NIST SP 800-38B, NIST SP 800-90a, NIST SP 800-90A, AIS 34, AIS 25, AIS 37, AIS 31, AIS 36, AIS31, AIS 35, AIS1, AIS14, AIS19, AIS 20, AIS 26, AIS 32, AIS 38, AIS39, AIS46, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065Technical reports
BSI TR-02102, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0977-V2-2019 |
---|---|
Subject | Common Criteria Certification |
Keywords | "Common Criteria, Certification, Zertifizierung, NXP, N7021VA" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20190805140846+02'00' |
Modification date | D:20190806092316+02'00' |
Pages | 32 |
Creator | Writer |
Producer | LibreOffice 5.2 |
Frontpage
Certificate ID | BSI-DSZ-CC-0977-V2-2019 |
---|---|
Certified item | NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software |
Certification lab | BSI |
Developer | NXP Semiconductors Germany GmbH |
References
Outgoing- BSI-DSZ-CC-0977-2017 - archived - NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software
- BSI-DSZ-CC-0977-V3-2021 - active - NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software
- BSI-DSZ-CC-1019-V2-2019 - active - Crypto Library Cobalt on N7021 VA
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, Triple-DES, 3DES, TDEA, CBC-MAC, CMACAsymmetric Algorithms
ECCSchemes
MACRandomness
TRNG, RNG, RNDBlock cipher modes
ECB, CBCVendor
NXP, NXP Semiconductors, NXP N.VSecurity level
EAL6, EAL4, EAL4+, EAL6 augmentedClaims
O.TDES, O.AES, O.RND, O.CUST_RECONFIG, O.NVM_INTEGRITY, O.MEM_ACCESS, O.SFR_ACCESS, O.REUSE, O.PUF, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, ADV_FSP.4, ADV_IMP.1, ADV_FSP, ADV_IMP, ADV_CMC.4, ADV_CMC.5, ADV_CMS.4, ADV_CMS.5, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_CMC.4, ALC_CMS.4, ALC_CMC, ALC_CMS, ALC_COV, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV.2, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_COP.1, FCS_CKM.4, FCS_RNG.1, FCS_CKM.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1.1, FCS_CKM.4.1, FCS_CKM.2, FCS_CKM.1.1, FDP_ACC.1, FDP_ACF.1, FDP_ITT.1, FDP_IFC.1, FDP_UCT.1, FDP_UIT.1, FDP_SDC.1, FDP_SDI.2, FDP_RIP.1, FDP_ITT.1.1, FDP_IFF.1, FDP_IFC.1.1, FDP_SDC.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMF.1.1, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_TST.1, FPT_ITT.1.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_FLT.2, FRU_FLT.1, FRU_FLT.2.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Protection profiles
BSI-PP-0084-2014, BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-0977Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, DPA, physical tampering, Malfunction, malfunction, reverse engineeringStandards
FIPS 197, FIPS PUB 197, SP 800-67, NIST SP 800-67, NIST SP 800-38A, NIST SP 800-38B, AIS31, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9797-1, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Creation date | D:20190716175810+02'00' |
---|---|
Modification date | D:20190716175810+02'00' |
Pages | 96 |
Creator | LaTeX with hyperref package |
Producer | pdfTeX-1.40.14 |
References
Incoming- 21.0.03/TSE-CCCS-72 - archived - Akis Gezgin_N SAC&EAC Configuration v1.0.1.0
- 21.0.03/TSE-CCCS-71 - archived - Akis Gezgin_N BAC Configuration with Active Authentication v1.0.1.0
Heuristics ?
Certificate ID: BSI-DSZ-CC-0977-V2-2019
Extracted SARs
ASE_CCL.1, AGD_PRE.1, ASE_REQ.2, ADV_TDS.5, ADV_CMS.5, ATE_IND.2, ASE_ECD.1, ASE_TSS.2, ADV_CMC.5, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_TAT.3, ALC_DVS.2, ADV_SPM.1, ALC_LCD.1, ATE_FUN.2, ALC_CMC.5, ASE_INT.1, ADV_IMP.2, ATE_COV.3, ASE_OBJ.2, ADV_INT.3, ADV_FSP.5, ATE_DPT.3, ALC_CMS.5, ALC_FLR.1, ADV_ARC.1, AGD_OPE.1References ?
Updates ?
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0977V2c_pdf.pdf",
"dgst": "e9f7510c182a1fed",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0977-V2-2019",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0977-V3-2021",
"BSI-DSZ-CC-1019-V2-2019"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0977-2017"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0977-V3-2021",
"BSI-DSZ-CC-1019-V2-2019"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0977-2017"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"21.0.03/TSE-CCCS-72",
"21.0.03/TSE-CCCS-71"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"21.0.03/TSE-CCCS-72",
"21.0.03/TSE-CCCS-71"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity",
"manufacturer_web": "https://www.nxp.com",
"name": "NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software",
"not_valid_after": "2024-07-31",
"not_valid_before": "2019-07-31",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "0977V2c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0977-V2-2019": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.1": 1
},
"ASE": {
"ASE_TSS.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 5": 1,
"EAL 6": 1,
"EAL 6 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 1,
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20190805151207+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "Common Criteria, Certification, Zertifizierung, NXP, N7021VA",
"/ModDate": "D:20190805151334+02\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "Common Criteria Certification",
"/Title": "Certificate BSI-DSZ-CC-0977-V2-2019",
"pdf_file_size_bytes": 413499,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "0977V2a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1",
"cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0977-V2-2019",
"cert_item": "NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software",
"cert_lab": "BSI",
"developer": "NXP Semiconductors Germany GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0977-": 1,
"BSI-DSZ-CC-0977-2017": 2,
"BSI-DSZ-CC-0977-V2-2019": 17
}
},
"cc_claims": {
"O": {
"O.C": 2
},
"R": {
"R.O": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ATE": 6
},
"ALC": {
"ALC_CMC.5": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 3,
"ALC_FLR.1": 5,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ASE": {
"ASE_TSS.2": 4
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 2,
"EAL 2+": 1,
"EAL 4": 1,
"EAL 5": 4,
"EAL 5+": 1,
"EAL 6": 5,
"EAL 6 augmented": 3
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"1.3, 2018-05-15, NXP Semiconductors (confidential document) [14] SmartMX3 N7021 Post Delivery Configuration Post Delivery Configuration, Objective data sheet": 1,
"Data Sheet addendum, Version 1.5, 2017- 11-03, NXP Semiconductors (confidential document) [18] SmartMX3 N7021, Inter-Card Communication Functionality and additional APIs, Objective data": 1,
"GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January": 1,
"Library Iron / Cobalt V1.0 on N7021 VA, Life Cycle, Version 1.3, 2017-03-07, NXP Semiconductors (confidential document) [30] P71D320 Crypto Library, Configuration Item List, Evaluation documentation, Version 1.0": 1,
"Manual, Version 1.4, 2019-06-04, NXP Semiconductors (confidential document) [21] SmartMX3 N7021 FlashLoader, Product Data Sheet addendum, Version 1.3, 2018- 08-24, NXP": 1,
"N7021 VA Security Target, BSI-DSZ-CC-0977- V2-2019, Version 2.3, 2019-06-04, NXP Semiconductors (confidential document) [7] Evaluation Technical Report N7021 VA, BSI-DSZ-CC-0977-V2, Version 4, 2019-07- 17, T\u00dcV": 1,
"NXP Semiconductors (confidential document) [13] SmartMX3 family N7021 Wafer and delivery specification, Objective wafer specification": 1,
"NXP Semiconductors (confidential document) [16] SmartMX3 N7021 Peripheral Configuration and Use Peripheral Configuration and Use on the N7021": 1,
"NXP Semiconductors (confidential document) [25] N7021 Crypto Library RNG Library, Product user manual, Version 1.3, 2017-03-27, NXP": 1,
"NXP Semiconductors (confidential document) [31] NXP Secure Smart Card Controller 7021 VA Evaluation Reference List, Version 2.2, 2019-07-17": 1,
"Objective data sheet addendum, Version 1.2, 2017-11-03, NXP Semiconductors (confidential document) [23] SmartMX3 N7021 NXP System Mode OS Interface UM configuration and applications, Objective data": 1,
"Objective data sheet addendum, Version 1.4, 2017-11-03, NXP Semiconductors (confidential document) [17] SmartMX3 N7021 MMU configuration \u0026 FW interface Access / resource management and security": 1,
"Semiconductors (confidential document) [32] NXP Secure Smart Card Controller N7021, Common Criteria CIL, Version 0.5, 2017-04-06, NXP": 1,
"VA Information on Guidance and Operation, User manual, Version 2.0, 2018-11-15, NXP Semiconductors (confidential document) [28] Order Entry Form, Version 1.9, 2017-03-27, NXP Semiconductors 26 / 32": 1,
"Version 1.1, 2017-03-22, NXP Semiconductors (confidential document) [15] SmartMX3 N7021 Chip Health Mode Chip Health Mode, Objective data sheet addendum, Version 1.0": 1,
"addendum, Version 1.1, 2017-03-09, NXP Semiconductors (confidential document) [19] SmartMX3 N7021 NVM Operate Function, Data Sheet addendum, Version 1.0, 2017-01-13, NXP": 1,
"addendum, Version 1.6, 2017-11-03, NXP Semiconductors (confidential document) [24] Crypto Library V1.0 on N7021 VA Symmetric Cipher Library (SymCfg), User manual, Version 1.2": 1,
"and electrical characteristics, Product data sheet, Version 3.1, 2019-06-04, NXP Semiconductors (confidential document) [12] SmartMX3 N7021 Instruction Set Manual, Objective data sheet addendum, Version 1.4, 2016-09-29": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
"confidential document) 27 / 32 Certification Report BSI-DSZ-CC-0977-V2-2019 C. Excerpts from the Criteria For the": 1,
"confidential document) [20] NXP Secure Smart Card Controller N7021 Information on Guidance and Operation, Guidance and": 1,
"confidential document) [22] SmartMX3 N7021 Shared OS Libraries Memory, communication and CRC, including guidance and": 1,
"confidential document) [26] N7021 Crypto Library Utils Library, User manual, Version 1.1, 2016-11-28, NXP Semiconductors": 1,
"for the N7021 VA, BSI-DSZ-CC- 0977-V2 version 4, 2019-07-17, T\u00dcV Informationstechnik GmbH (confidential document) 7 specifically \u2022 AIS1, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung des": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 6
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 1,
"side-channel": 1
},
"other": {
"JIL": 4
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 25": 2,
"AIS 26": 1,
"AIS 31": 3,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 2,
"AIS 37": 1,
"AIS 38": 1,
"AIS1": 1,
"AIS14": 1,
"AIS19": 1,
"AIS31": 6,
"AIS39": 1,
"AIS46": 1
},
"FIPS": {
"FIPS 197": 6,
"FIPS197": 9
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
},
"NIST": {
"NIST SP 800-38A": 4,
"NIST SP 800-38B": 2,
"NIST SP 800-67": 7,
"NIST SP 800-90A": 1,
"NIST SP 800-90a": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 15,
"AES-": 1
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 2,
"Triple-DES": 2
},
"DES": {
"DES": 7
}
},
"constructions": {
"MAC": {
"CBC-MAC": 3,
"CMAC": 6
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 62,
"NXP Semiconductors": 41
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20190805140846+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, NXP, N7021VA\"",
"/ModDate": "D:20190806092316+02\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0977-V2-2019",
"pdf_file_size_bytes": 1163400,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.sogisportal.eu/",
"https://www.bsi.bund.de/AIS",
"https://www.bsi.bund.de/zertifizierungsreporte",
"https://www.bsi.bund.de/",
"http://www.commoncriteriaportal.org/cc/",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 32
},
"st_filename": "0977V2b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0977": 2
}
},
"cc_claims": {
"O": {
"O.AES": 4,
"O.CUST_RECONFIG": 5,
"O.MEM_ACCESS": 5,
"O.NVM_INTEGRITY": 4,
"O.PUF": 5,
"O.REUSE": 5,
"O.RND": 4,
"O.SFR_ACCESS": 4,
"O.TDES": 5
},
"T": {
"T.RND": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_CMC.4": 1,
"ADV_CMC.5": 1,
"ADV_CMS.4": 1,
"ADV_CMS.5": 1,
"ADV_FSP": 1,
"ADV_FSP.4": 6,
"ADV_FSP.5": 12,
"ADV_IMP": 1,
"ADV_IMP.1": 3,
"ADV_IMP.2": 3,
"ADV_INT.3": 1,
"ADV_SPM.1": 8,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 3,
"ALC_CMC.5": 5,
"ALC_CMS": 2,
"ALC_CMS.4": 4,
"ALC_CMS.5": 5,
"ALC_COV": 1,
"ALC_DEL.1": 2,
"ALC_DVS.2": 2,
"ALC_FLR.1": 5,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.2": 5
},
"ATE": {
"ATE_COV.2": 3,
"ATE_COV.3": 5,
"ATE_DPT.3": 1,
"ATE_FUN.2": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL4": 3,
"EAL4+": 1,
"EAL6": 46,
"EAL6 augmented": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 6,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 27,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 33,
"FCS_CKM.4.1": 3,
"FCS_COP.1": 39,
"FCS_COP.1.1": 6,
"FCS_RNG.1": 17,
"FCS_RNG.1.1": 5,
"FCS_RNG.1.2": 4
},
"FDP": {
"FDP_ACC.1": 54,
"FDP_ACC.1.1": 4,
"FDP_ACF.1": 41,
"FDP_ACF.1.1": 5,
"FDP_ACF.1.2": 5,
"FDP_ACF.1.3": 5,
"FDP_ACF.1.4": 4,
"FDP_IFC.1": 20,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 1,
"FDP_ITC.1": 19,
"FDP_ITC.2": 19,
"FDP_ITT.1": 9,
"FDP_ITT.1.1": 1,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_SDC.1": 4,
"FDP_SDC.1.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 6,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT.1": 5,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 4,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FMT": {
"FMT_LIM.1": 16,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 17,
"FMT_LIM.2.1": 2,
"FMT_MSA.1": 33,
"FMT_MSA.1.1": 3,
"FMT_MSA.3": 32,
"FMT_MSA.3.1": 3,
"FMT_MSA.3.2": 3,
"FMT_SMF.1": 30,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 19
},
"FPT": {
"FPT_FLS.1": 12,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 6,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 8,
"FPT_PHP.3.1": 1,
"FPT_TST.1": 8,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT.1": 1,
"FRU_FLT.2": 9,
"FRU_FLT.2.1": 1
},
"FTP": {
"FTP_ITC.1": 9,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 12
},
"ECB": {
"ECB": 9
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 7,
"RNG": 43
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 11,
"malfunction": 6,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 12,
"Physical Probing": 4,
"physical probing": 5
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 2
},
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1,
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 197": 4,
"FIPS PUB 197": 2
},
"ISO": {
"ISO/IEC 14443": 6,
"ISO/IEC 7816": 12,
"ISO/IEC 9797-1": 1
},
"NIST": {
"NIST SP 800-38A": 6,
"NIST SP 800-38B": 2,
"NIST SP 800-67": 4,
"SP 800-67": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 51
}
},
"DES": {
"3DES": {
"3DES": 2,
"TDEA": 1,
"TDES": 18,
"Triple-DES": 16
},
"DES": {
"DES": 10
}
},
"constructions": {
"MAC": {
"CBC-MAC": 10,
"CMAC": 7
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 81,
"NXP N.V": 1,
"NXP Semiconductors": 34
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "D:20190716175810+02\u002700\u0027",
"/Creator": "LaTeX with hyperref package",
"/Keywords": "",
"/ModDate": "D:20190716175810+02\u002700\u0027",
"/PTEX.Fullbanner": "This is MiKTeX-pdfTeX 2.9.4902 (1.40.14)",
"/Producer": "pdfTeX-1.40.14",
"/Subject": "",
"/Title": "",
"/Trapped": "/False",
"pdf_file_size_bytes": 984829,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://doi.org/10.6028/NIST.SP.800-67r2",
"http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf",
"http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 96
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf",
"pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/0977V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"ASE_TSS.2",
"EAL6+"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/0977V2b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "534220459fb6c5c14b5746b7cc18047621c7602cf055953da82b6a98ae066a1a",
"txt_hash": "a4d4ea60f49ef205045187b56e7d1b3888550ded2af7379ce0240622f59865cc"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d35587d3150e651832e3d12cfe9f4cf96129d6c1100783ba54cb407f391d1642",
"txt_hash": "0c0267b1bba1fa0a26c6173aa47ab94a69876075996f976310dce52fd5c55f53"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "181aab4f63f4fa5d1f8cf7ffa01bbfbed51c39e929b7c468fe7801d9e732c566",
"txt_hash": "2d627ceee6f59d83ea36254290f544dc653b75824cf636116df6291dfbb49956"
}
},
"status": "active"
}