NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)

CSV information ?

Status active
Valid from 05.03.2024
Valid until 05.03.2029
Scheme 🇩🇪 DE
Manufacturer NXP Semiconductors Germany GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_FLR.1, EAL6+, ASE_TSS.2
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1136-V4-2024

Certificate ?

Extracted keywords

Vendor
NXP, NXP Semiconductors

Security level
EAL 6, EAL 5, EAL 2, EAL 6 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, ASE_TSS.2
Protection profiles
BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1136-V4-2024

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certificate BSI-DSZ-CC-1136-V4-2024
Subject Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller
Keywords "Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller"
Author Federal Office for Information Security
Pages 1

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, Triple-DES, TDEA, CBC-MAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC, Key Exchange
Randomness
TRNG, RNG
Libraries
Crypto Library 0.7.6, Crypto Library 0.7.7, Crypto Library v0.7.6, Crypto Library v0.7.7
Block cipher modes
ECB, CBC, CTR, OFB

Vendor
NXP, NXP Semiconductors

Security level
EAL 6, EAL 5, EAL 2, EAL 1, EAL 4, EAL 5+, EAL 6 augmented
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_FUN, ATE_IND, AVA_VAN, ASE_TSS.2
Security Functional Requirements (SFR)
FCS_COP
Protection profiles
BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1136-V4-2024, BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-1136-V4-
Evaluation facilities
TĂśV Informationstechnik

Side-channel analysis
physical probing, side-channel, DPA, SPA, fault injection, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report NXP Secure Smart Card Controller N7121 with IC Dedicated Software, 2024, Version 2, 2024-02-20, Evaluation Technical Report Summary, TĂśV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, Evaluation Technical Report For Composite Evaluation (ETR Comp), TĂśV Informationstechnik GmbH (confidential document) [11] SmartMX3 family N7121, Wafer and delivery specification, Version 3.3, 2021-08-27, NXP, confidential document) [12] NXP Secure Smart Card Controller N7121, Information on Guidance and Operation, Version 3.2, NXP Semiconductors (confidential document) [13] NXP Secure Smart Card Controller N7121, Overview Product data sheet, Version 3.3, 2020-04-15

Standards
FIPS197, FIPS 186-4, FIPS186-4, FIPS180-4, NIST SP 800-90A, NIST SP 800-108, PKCS #1, AIS 34, AIS 25, AIS 37, AIS 31, AIS 36, AIS31, AIS20, AIS 20, AIS 35, AIS 1, AIS 14, AIS 19, AIS 26, AIS 32, AIS 39, AIS 46, AIS 47, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 14888-3
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1136-V4-2024
Subject Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller
Keywords "Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller"
Author Federal Office for Information Security
Pages 39

Frontpage

Certificate ID BSI-DSZ-CC-1136-V4-2024
Certified item NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4
Certification lab BSI
Developer NXP Semiconductors Germany GmbH

References

Outgoing
  • BSI-DSZ-CC-1136-V2-2022 - active - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3)
  • BSI-DSZ-CC-1136-V3-2022 - active - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
Incoming
  • NSCIB-CC-2300155-01-CR - active - NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE
  • NSCIB-CC-2300172-01-CR - active - NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11
  • NSCIB-CC-2300154-01-CR - active - NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing MachineReadable Electronic Documents based on BSI TR-03110 for Official Use with BAC option
  • NSCIB-CC-2300157-01-CR - active - NXP eDoc Suite v3.5 on JCOP4 71 - cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with key import (SSCD)
  • NSCIB-CC-2300156-01-CR - active - NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-, AES-128, DES, TDES, Triple-DES, TDEA, SEED, HMAC, CMAC, CBC-MAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC, Key Exchange, Key Agreement
Protocols
PACE
Randomness
RNG, RND
Libraries
Crypto Library 0.7.6, Crypto Library 0.7.7
Elliptic Curves
brainpoolP224r1, brainpoolP224t1, brainpoolP256r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1, ANSSI FRP256v1
Block cipher modes
ECB, CBC, CTR

Vendor
NXP, NXP Semiconductors

Security level
EAL6, EAL4, EAL4+, EAL6 augmented, EAL4 augmented
Claims
O.RND, O.TDES, O.AES, O.SHA, O.PUF, O.RSA, O.ECC, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, ADV_FSP.4, ADV_IMP.1, ADV_CMC.4, ADV_CMC.5, ADV_CMS.4, ADV_CMS.5, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_CMC.4, ALC_CMS.4, ALC_CMS, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV.2, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_CKM.5, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.5.1, FCS_RNG, FCS_RNG.1, FCS_COP, FCS_CKM, FCS_CKM.1, FDP_SDC.1, FDP_SDC.1.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FDP_ITT.1.1, FDP_IFC.1, FDP_IFC.1.1, FDP_ACF, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_ACC, FDP_ACC.1, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_MSA, FMT_LIM.1, FMT_LIM.1.1, FMT_LIM.2, FMT_LIM.2.1, FMT_LIM, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_SMR, FMT_SMR.1, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_FLT.2, FRU_FLT.2.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0084-2014
Certificates
BSI-DSZ-CC-1136

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, physical tampering, Malfunction, malfunction, fault injection

Standards
FIPS 197, FIPS 186-4, FIPS 180-4, FIPS PUB 180-4, FIPS PUB 186-4, NIST SP 800-67, NIST SP 800-38A, NIST SP 800-38B, PKCS #1, AIS31, AIS20, AIS26, AIS 26, AIS 31, RFC 5639, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9797-1, ISO/IEC 14888-3, ISO/IEC 11770-3, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-03110-1, BSI TR-03110-2, BSI TR-03110-3, BSI TR-03110-4

File metadata

Title Security Target Lite
Subject NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
Keywords Common Criteria, Security Target, Security IC, N7121
Author NXP B.V.
Pages 84

References

Incoming
  • NSCIB-CC-2300155-01-CR - active - NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE
  • NSCIB-CC-2300172-01-CR - active - NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11
  • NSCIB-CC-2300154-01-CR - active - NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing MachineReadable Electronic Documents based on BSI TR-03110 for Official Use with BAC option
  • NSCIB-CC-2300157-01-CR - active - NXP eDoc Suite v3.5 on JCOP4 71 - cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with key import (SSCD)
  • NSCIB-CC-2300156-01-CR - active - NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD)

Heuristics ?

Certificate ID: BSI-DSZ-CC-1136-V4-2024

Extracted SARs

ATE_COV.3, ADV_FSP.5, ASE_SPD.1, ASE_INT.1, ADV_TDS.5, AGD_OPE.1, ALC_LCD.1, ADV_CMC.5, ADV_IMP.2, ALC_CMC.5, ALC_FLR.1, ALC_TAT.3, ATE_DPT.3, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, ATE_IND.2, ATE_FUN.2, ASE_ECD.1, ASE_OBJ.2, ALC_CMS.5, ALC_DEL.1, ASE_TSS.2, AVA_VAN.5, ADV_CMS.5, ADV_INT.3, ADV_SPM.1, ASE_REQ.2, ADV_ARC.1

Similar certificates

Name Certificate ID
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) BSI-DSZ-CC-1136-V3-2022 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1136-V2-2022 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1149-V2-2023 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3) BSI-DSZ-CC-1149-V3-2023 Compare
NXP Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2) BSI-DSZ-CC-1136-2021 Compare
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library BSI-DSZ-CC-1040-2019 Compare
NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1) BSI-DSZ-CC-1149-2022 Compare
NXP Smart Card Controller P5CC037V0A with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0550-2008 Compare
NXP Smart Card Controller P5CC052V0A with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0551-2008 Compare
NXP Smart Card Controller P5CD144V0B with IC Dedicated Software, Secured Crypto Library Release 2.0 BSI-DSZ-CC-0440-2008 Compare
NXP Smart Card Controller P5CD040V0B with IC dedicated software: Secured Crypto Library Release 2.0 to EAL5+ BSI-DSZ-CC-0439-2008 Compare
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0A, P5CC012V0A all with IC dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0549-2008 Compare
NXP Smart Card Controller P5CC024V0A, P5CC020V0A, P5SC020V0a and P5CC012V0A each with IC Dedicated Software: Secured Crypto Library Release 2.0 to CC EAL5+ BSI-DSZ-CC-0464-2008 Compare
NXP P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software BSI-DSZ-CC-0584-2009 Compare
NXP Smart Card Controller P5CD080V0B with Dedicated software: Secured Crypto Library Release 2.0 BSI-DSZ-CC-0417-2008 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Base, SCL, HCL, PSL and with specific IC dedicated software BSI-DSZ-CC-0827-V8-2020 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22, M9900 C22, M9900 D22, M9900 G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048, RSA4096, EC, Toolbox, Base, FTL, SCL, HCL, and PSL, and with specific IC dedicated software BSI-DSZ-CC-0827-V7-2018 Compare
Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software BSI-DSZ-CC-0827-V4-2016 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software BSI-DSZ-CC-1025-V3-2020 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000011h, IFX_CCI_00001Bh, IFX_CCI_00001Eh, IFX_CCI_000025h, design step G12 with optional libraries and with specific IC dedicated software BSI-DSZ-CC-1025-V4-2021 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries and with specific IC dedicated software BSI-DSZ-CC-1025-V2-2019 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 with optional libraries and with specific IC dedicated software BSI-DSZ-CC-0961-V5-2020 Compare
Infineon smart card IC (Security Controller) M7801 A12 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software BSI-DSZ-CC-0606-2010 Compare
Infineon Smart Card IC (Security Controller) SLE66CX366PE / M1528-k11, SLE66CX206PE / M1506-k11 and SLE66CX186PE / M1503-k11 all with optional libraries RSA2048 V1.6 and ECC V1.1 and with specific IC dedicated software BSI-DSZ-CC-0554-2009 Compare
Infineon Smart Card IC (Security Controller) SLE66CX126PE / M2160-k11 and SLE66CX86PE / M2161-k11 both with optional libraries RSA V1.6, EC V1.1 and SHA-2 V1.0 both with specific IC dedicated software BSI-DSZ-CC-0627-2009 Compare
Infineon Smart Card IC (Security Controller) SLE66CX162PE / m1531-a25 and SLE66CX80PE / m1533-a25 all with optional libraries RSA V1.6, EC, V1.1, SHA-2 V1.0 and both with specific IC dedicated software BSI-DSZ-CC-0629-2010 Compare
Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software BSI-DSZ-CC-0640-2010 Compare
Infineon smart card IC (Security Controller) M7801 A12 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0727-2011 Compare
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0813-2012 Compare
Infineon smart card IC (Security Controller) M7820 M11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0695-2011 Compare
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software BSI-DSZ-CC-0829-V2-2015 Compare
Infineon smart card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.02.008, EC v1.02.008, SHA-2 v1.01 and Toolbox v1.02.008 libraries and with specific IC dedicated software BSI-DSZ-CC-0728-2011 Compare
Infineon smart card IC (Security Controller) M7820 A11 and M11 with optional RSA2048/4096 v1.02.013, EC v1.02.013, SHA-2 v1.01 and Toolbox v1.02.013 libraries and with specific IC dedicated software BSI-DSZ-CC-0829-2012 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000007h, IFX_CCI_000009h, IFX_CCI_00000Ah, IFX_CCI_00000Bh, IFX_CCI_000016h, IFX_CCI_000017h, IFX_CCI_000018h, IFX_CCI_000023h, IFX_CCI_000024h design step G13 with optional libraries CIPURSE™ CL, RSA2048/4096, EC, Toolbox, HSL, SCL and with specific IC dedicated software BSI-DSZ-CC-0961-V3-2018 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A21 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software BSI-DSZ-CC-0827-2013 Compare
SAM 5000 build 4.9, BOS-V1 and RMS firmware with ID 80001141, SLE97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v1.03.006, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip) CSEC2014007 Compare
SAM 5000 build 4.12, BOS-V1 and RMS firmware with ID 80001141 CL97 Asymmetric Crypto Library for Crypto@2304T RSA/ECC/Toolbox v2.07.003, and Infineon Technologies Smart Card IC Security Controller M9900, design step A22 and G11, of the SLE97 family (smart card), or the SLI97 family (VQFN chip) CSEC2017020 Compare
NXP Secure Smart Card Controller MF3F60x1 with IC Dedicated Support Software BSI-DSZ-CC-0587-2010 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22 and G11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software BSI-DSZ-CC-0827-V2-2014 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 00022Dh, design step H13 with optional libraries CIPURSE™ CL, RSA2048/4096, EC, Toolbox, HSL, MCS, SCL and with specific IC dedicated software BSI-DSZ-CC-0945-V3-2018 Compare
Infineon smart card IC (Security Controller) M9900 A22 and G11, M9905, M9906 A11 with optional RSA v1.03.006, EC v1.03.006, Toolbox v1.03.006 and Flash Translation Layer V1.01.0008 libraries with specific IC dedicated software BSI-DSZ-CC-0827-V3-2015 Compare
Infineon Smart Card IC (Security Controller) SLE66CX680PE / M1534-a14, SLE66CX360PE / M1536-a14, SLE66CX182PE / M1564-a14, SLE66CX480PE / M1565-a14 and SLE66CX482PE / M1577-a14 all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and with specific IC dedicated software BSI-DSZ-CC-0628-2009 Compare
Infineon Technologies Smart Card IC (Security Controller) M5072 with optional RSA v1.03.006/v2.06.003, EC v1.03.006/ v2.06.003, Toolbox v1.03.006/ v2.06.003, SCL v2.02.010 libraries with specific IC dedicated software BSI-DSZ-CC-0946-V3-2017 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V5-2022 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V5-2022 Compare
NXP Secure Smart Card Controller P60x017/041PVE including IC Dedicated Software BSI-DSZ-CC-0954-2015 Compare
NXP Secure Smart Card Controller P60x017/041PVD including IC Dedicated Software BSI-DSZ-CC-0896-2014 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V4-2021 Compare
NXP Secure Smart Card Controller P6021y VA including IC Dedicated Software BSI-DSZ-CC-0981-2016 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V2-2019 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V4-2021 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V3-2019 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-2018 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000011h, 00001Bh, 00001Eh, 000025h, design step G12 with optional libraries CCL V02.00.0005, RSA2048/4096 V2.07.003, EC V2.07.003, Toolbox V2.07.003, HSL V2.01.6198, SCL V2.04.002 and with specific IC dedicated software BSI-DSZ-CC-1025-2018 Compare
NXP Secure Smart Card Controller P6021y VB* including IC Dedicated Software BSI-DSZ-CC-1072-V3-2019 Compare
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software BSI-DSZ-CC-0977-V2-2019 Compare
NXP Secure Smart Card Controllers P5CC008V1A, P5CC012V1A each including IC Dedicated Software BSI-DSZ-CC-0771-2011 Compare
NXP Secure Smart Card Controller P60D024/016/012PVB with IC Dedicated Software BSI-DSZ-CC-0810-2012 Compare
NXP Secure Smart Card Controller P61N1M3PVD/VE including IC Dedicated Software BSI-DSZ-CC-0824-2014 Compare
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software BSI-DSZ-CC-0977-V3-2021 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-2018 Compare
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software BSI-DSZ-CC-0977-2017 Compare
NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software BSI-DSZ-CC-1059-V2-2019 Compare
Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) BSI-DSZ-CC-0891-V6-2021 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22/G11, M9905 A11, M9906 A11 with optional RSA v1.03.006/v2.05.005, EC v1.03.006/v2.05.005, Toolbox v1.03.006/v2.05.005, Flash Translation Layer V1.01.0008, SCL v2.01.011/v2.02.010 and PSL v4.00.009 libraries with specific IC dedicated software BSI-DSZ-CC-0827-V5-2017 Compare
Philips P5CC036V1D Secure Smart Card Controller with Cryptographic Library as IC Dedicated Support Software BSI-DSZ-CC-0368-2006 Compare
NXP Secure Smart Card Controller P5CD144V0B, P5CN144V0B and P5CC144V0B each with specific IC Dedicated Software BSI-DSZ-CC-0411-2007 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B and P5CC080V0B each with specific IC Dedicated Software BSI-DSZ-CC-0410-2007 Compare
Philips P5CC036V1D Secure Smart Card Controller with Cryptographic Libraries IC Dedicated Support Software BSI-DSZ-CC-0296-2006 Compare
NXP Secure Smart Card Controller P60x144/080PVA with IC Dedicated Software FW5.0 BSI-DSZ-CC-0845-2012 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 with optional libraries CCL V2.0.0002, RSA2048/4096 V2.07.003 / V2.06.003, EC V2.07.003 / V2.06.003, Toolbox V2.07.003 / V2.06.003, HSL V02.01.6634 / V01.22.4346, SCL V2.02.010 and with specific IC dedicated software BSI-DSZ-CC-0961-V2-2018 Compare
Infineon Smart Card IC (Security Controller) SLE66CLX800PE m1581-k11/a15, SLE66CLX800PEM m1580-k11/a15, SLE66CLX800PES m1582-k11/a15, SLE66CX800PE m1599-k11/a15, SLE66CLX360PE m1587-k11/a15, SLE66CLX360PEM m1588-k11/a15, SLE66CLX360PES m1589-k11/a15, SLE66CLX180PE m2080-a15, SLE66CLX180PEM m2081-a15, SLE66CLX120PE m2082-a15, SLE66CLX120PEM m2083-a15 all with optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 all with specific IC dedicated software BSI-DSZ-CC-0626-2009 Compare
Infineon Smart Card IC (Security Controller) SLE66CLX206PEM / m2084-a11, SLE66CLX206PE / m2085-a11, SLE66CLX206PES / m2086-a11, SLE66CDX206PEM / m2099-a11, SLE66CLX203PEM / m2098-a11, SLE66CLX207PEM / m2980-a11, SLE66CLX207PE / m2981-a11, SLE66CLX207PES / m2982-a11, SLE66CLX126PEM / m2087-a11, SLE66CLX126PE / m2088-a11, SLE66CLX126PES / m2089-a11, SLE66CLX127PEM / m2997-a11, SLE66CLX127PE / m2998-a11, SLE66CLX127PES / m2999-a11, all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and all with specific IC dedicated software BSI-DSZ-CC-0593-2009 Compare
Infineon Technologies Smart Card IC (Security Controller) M9900 A22/G11/C22/D22, M9905 A11, M9906 A11 with optional RSA v1.03.006/v2.05.005/v2.07.003, EC v1.03.006/v2.05.005/v2.07.003, Toolbox v1.03.006/v2.05.005/v2.07.003, Flash Translation Layer V1.01.0008, SCL v2.01.011/v2.02.010 and PSL v4.00.09 libraries with specific IC dedicated software BSI-DSZ-CC-0827-V6-2017 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 00022Dh, design step H13 with optional libraries CCL V2.0.0002, RSA2048/4096 V2.07.003 / V2.06.003, EC V2.07.003 / V2.06.003, Toolbox V2.07.003 / V2.06.003, HSL V02.01.6634 / V01.22.4346, MCS V02.02.3389 / V02.03.3446, SCL V2.02.010 and with specific IC dedicated software BSI-DSZ-CC-0945-V2-2018 Compare
Infineon smart card IC (Security Controller) IFX_CCI_000007h, 000009h, 00000Ah, 00000Bh, 000016h, 000017h, 000018h, 000023h, 000024h, design step G13 with optional libraries CCL V02.00.0004, RSA2048/4096 V2.08.007 / V2.07.003 / V2.06.003, EC V2.08.007 / V2.07.003 / V2.06.003, Toolbox V2.08.007 / V2.07.003 / V2.06.003, HSL V03.12.8812 / V03.11.8339 / V02.01.6634 / V01.22.4346, SCL V2.04.002 / V2.02.010 and with specific IC dedicated software BSI-DSZ-CC-0961-V4-2019 Compare
NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software BSI-DSZ-CC-0810-V2-2014 Compare
NXP Secure Smart Card Controller P5CD040V0B, P5CC040V0B, P5CD020V0B and P5CC021V0B each with specific IC Dedicated Software BSI-DSZ-CC-0404-2007 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CC080V0B, P5CN080V0B, P5CC073V0B each with specific IC Dedicated Software BSI-DSZ-CC-0700-2011 Compare
NXP Secure Smart Card Controller P5CD080V0B, P5CN080V0B, P5CC080V0B and P5CC073V0B each with specific IC Dedicated Software BSI-DSZ-CC-0680-2010 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software BSI-DSZ-CC-0939-V2-2016 Compare
NXP Secure Smart Card Controller P60D024/016/012PVB(Y/Z/A)/PVF with IC Dedicated Software BSI-DSZ-CC-0939-2015 Compare
NXP Secure Smart Card Controller P60x080/052/040yVC(Y/Z/A)/yVG with IC Dedicated Software BSI-DSZ-CC-0837-V3-2016 Compare
NXP Secure Smart Card Controllers P5CC008, P5CC012 V1A/V1A(s) each including IC Dedicated Software BSI-DSZ-CC-0855-2013 Compare
NXP Secure Smart Card Controller P60x144/080PVA/PVA(Y) with IC Dedicated Software FW5.0 BSI-DSZ-CC-0845-V2-2013 Compare
NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)PVG with IC Dedicated Software BSI-DSZ-CC-0837-V2-2014 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software BSI-DSZ-CC-0939-V3-2018 Compare
NXP Secure Smart Card Controller P60D144/080MVA including IC Dedicated Software with MIFARE Plus MF1PLUSx0 BSI-DSZ-CC-0840-2013 Compare
NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software BSI-DSZ-CC-0978-V3-2019 Compare
NXP Secure Smart Card Controller P60D080/052/040MVC including IC Dedicated Software with MIFARE Plus MF1PLUSx0 BSI-DSZ-CC-0871-2013 Compare
NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software BSI-DSZ-CC-0978-V2-2017 Compare
NXP Secure Smart Card Controller P60D024/016/012MVB including IC Dedicated Software with MIFARE Plus MF1PLUSx0 BSI-DSZ-CC-0842-2013 Compare
NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software BSI-DSZ-CC-0978-2016 Compare
NXP Secure Smart Card Controller P5CT072V0N, P5CD072V0N, P5CD036V0N, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software BSI-DSZ-CC-0375-2007 Compare
NXP Secure PKI Smart Card Controllers P5CD145V0A, MSO; P5CC145V0A, MSO; P5CD128V0A, MSO and P5CC128V0A, MSO; each including IC Dedicated Software BSI-DSZ-CC-0645-2010 Compare
S3CC91A 16-bit RISC Microcontroller for Smart Card, Revision 7 with optional Secure RSA Crypto Library and specific IC Dedicated Software BSI-DSZ-CC-0581-2009 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB including IC Dedicated Software with MIFARE Plus MF1PLUSx0 or MIFARE DESFire EV1 BSI-DSZ-CC-0830-2013 Compare
NXP Secure Smart Card Controller P60x144/080yVA including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 BSI-DSZ-CC-0870-2014 Compare
NXP Secure Smart Card Controller P60D024/016/012yVB/yVB(Y) including IC Dedicated Software with MIFARE Plus MF1PLUSx0 or MIFARE DESFire EV1 BSI-DSZ-CC-0830-V2-2014 Compare
NXP Secure Smart Card Controller P60D080/052/040yVC including IC Dedicated Software with MIFARE Plus MF1PLUSx0 or with MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 BSI-DSZ-CC-0897-2013 Compare
NXP Secure Smart Card Controller P60D080/052/040yVC(Z/A)/yVG including IC Dedicated Software MIFARE Plus MF1PLUSx0 or MIFARE Plus MF1PLUSx0 and MIFARE DESFire EV1 BSI-DSZ-CC-0897-V2-2014 Compare
NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software BSI-DSZ-CC-0858-V2-2015 Compare
NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software BSI-DSZ-CC-0858-2013 Compare
Infineon smart card IC (Security Controller) M9900 A21 with specific IC dedicated software BSI-DSZ-CC-0791-2012 Compare
NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6021P VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6021M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0955-2016 Compare
NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6021P VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6021M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0955-V2-2016 Compare
NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0973-2016 Compare
NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0973-V2-2016 Compare
Infineon Smart Card IC (Security Controller), SLE66CL80P / m1457a14 and SLE66CL81P / m1436a14 with specific IC Dedicated Software BSI-DSZ-CC-0401-2006 Compare
Infineon Smart Card IC (Security Controller) SLE66CX642P/m1485b16 with RSA 2048 V1.30 and specific IC Dedicated Software BSI-DSZ-CC-0315-2005 Compare
Infineon Smart Card IC (Security Controller) SLE66CL80P/m1457-a14 and SLE66CL81P/m1436-a14 with specific IC Dedicated Software BSI-DSZ-CC-0354-2006 Compare
Infineon Smart Card IC (Security Controller) SLE66CX322P/m1484b14 and m1484f18 with RSA 2048 V1.30 and specific IC Dedicated Software BSI-DSZ-CC-0266-2005 Compare
Infineon Smart Card IC (Security Controller) SLE66CLX320P / m1559b19 and SLE66CLX321P / m1359b19 both with RSA2048 V1.3 and specific IC Dedicated Software BSI-DSZ-CC-0337-2005 Compare
Showing 5 out of 113.

References ?

Updates ?

  • 30.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-2400004-01-CR']}}} data.
    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-2400004-01-CR']}}} data.
    • The scheme_data property was set to None.
  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BAROC_SC_PP_V1.0', 'JAVA_OC', 'SECURITY_IC_AUGP_V1.0']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e8618a61e968de23b339cd627b2dc8054a1682e373bef85ce5905c41150832e6', 'txt_hash': 'cf777065dbef7ce344f2e867ebb1e58cec4cada57a1632bcadddddbd97b6a5ae'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '266e3dee69a8d024ad80851a0e2cc977f1589718dee016ebc2e6b14a1a13f7f4', 'txt_hash': '0c22211ca9b5526949efbf0b2f0f46eb3c81d2d1b8ba2a4964c8a752a9014252'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 777912, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 84, '/Author': 'NXP B.V.', '/Keywords': 'Common Criteria, Security Target, Security IC, N7121', '/Subject': 'NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)', '/Title': 'Security Target Lite', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 235369, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Federal Office for Information Security', '/Keywords': '"Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller"', '/Subject': 'Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller', '/Title': 'Certificate BSI-DSZ-CC-1136-V4-2024', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1136': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 2}}, 'cc_security_level': {'EAL': {'EAL6': 46, 'EAL4': 3, 'EAL4+': 1, 'EAL6 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.5': 8, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 8, 'ADV_FSP.4': 4, 'ADV_IMP.1': 2, 'ADV_CMC.4': 1, 'ADV_CMC.5': 1, 'ADV_CMS.4': 1, 'ADV_CMS.5': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.1': 6, 'ALC_CMC.5': 2, 'ALC_CMS.5': 2, 'ALC_DEL.1': 2, 'ALC_DVS.2': 2, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_CMC.4': 2, 'ALC_CMS.4': 3, 'ALC_CMS': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV.2': 2}, 'AVA': {'AVA_VAN.5': 3}, 'ASE': {'ASE_TSS.2': 7, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 5, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_CKM.5': 4, 'FCS_CKM.2': 4, 'FCS_COP.1': 14, 'FCS_CKM.4': 20, 'FCS_CKM.5.1': 1, 'FCS_RNG': 16, 'FCS_RNG.1': 8, 'FCS_COP': 45, 'FCS_CKM': 65, 'FCS_CKM.1': 5}, 'FDP': {'FDP_SDC.1': 4, 'FDP_SDC.1.1': 1, 'FDP_SDI.2': 5, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITT.1': 7, 'FDP_ITT.1.1': 1, 'FDP_IFC.1': 11, 'FDP_IFC.1.1': 1, 'FDP_ACF': 16, 'FDP_UCT': 6, 'FDP_UCT.1': 1, 'FDP_UIT': 5, 'FDP_UIT.1': 2, 'FDP_ACC': 14, 'FDP_ACC.1': 7, 'FDP_ACF.1': 10, 'FDP_ITC.1': 19, 'FDP_ITC.2': 19, 'FDP_MSA': 4}, 'FMT': {'FMT_LIM.1': 8, 'FMT_LIM.1.1': 1, 'FMT_LIM.2': 8, 'FMT_LIM.2.1': 1, 'FMT_LIM': 13, 'FMT_SMF.1': 8, 'FMT_SMF.1.1': 1, 'FMT_MSA': 13, 'FMT_MSA.1': 2, 'FMT_MSA.3': 5, 'FMT_SMR': 2, 'FMT_SMR.1': 1}, 'FPT': {'FPT_FLS.1': 10, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 8, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 7, 'FPT_ITT.1.1': 1, 'FPT_TST.1': 6, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FRU': {'FRU_FLT.2': 8, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC': 6, 'FTP_ITC.1': 5, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RND': 5, 'O.TDES': 5, 'O.AES': 4, 'O.SHA': 3, 'O.PUF': 4, 'O.RSA': 4, 'O.ECC': 4}, 'T': {'T.RND': 2}}, 'vendor': {'NXP': {'NXP': 392, 'NXP Semiconductors': 26}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 44, 'AES-': 1, 'AES-128': 2}}, 'DES': {'DES': {'DES': 3}, '3DES': {'TDES': 32, 'Triple-DES': 8, 'TDEA': 1}}, 'miscellaneous': {'SEED': {'SEED': 1}}, 'constructions': {'MAC': {'HMAC': 1, 'CMAC': 5, 'CBC-MAC': 6}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 12}, 'ECC': {'ECC': 50}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 4, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 4}}}, 'crypto_scheme': {'MAC': {'MAC': 8}, 'KEX': {'Key Exchange': 3}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 2}}, 'randomness': {'RNG': {'RNG': 33, 'RND': 7}}, 'cipher_mode': {'ECB': {'ECB': 6}, 'CBC': {'CBC': 6}, 'CTR': {'CTR': 2}}, 'ecc_curve': {'Brainpool': {'brainpoolP224r1': 3, 'brainpoolP224t1': 3, 'brainpoolP256r1': 4, 'brainpoolP256t1': 4, 'brainpoolP320r1': 3, 'brainpoolP320t1': 3, 'brainpoolP384r1': 4, 'brainpoolP384t1': 4, 'brainpoolP512r1': 4, 'brainpoolP512t1': 4}, 'ANSSI': {'ANSSI FRP256v1': 3}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library 0.7.6': 4, 'Crypto Library 0.7.7': 4}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 7, 'Physical Probing': 2, 'physical probing': 2, 'side channel': 6, 'DPA': 1}, 'FI': {'physical tampering': 1, 'Malfunction': 7, 'malfunction': 2, 'fault injection': 2}}, 'technical_report_id': {'BSI': {'BSI TR-03110-1': 1, 'BSI TR-03110-2': 1, 'BSI TR-03110-3': 1, 'BSI TR-03110-4': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 5, 'FIPS 186-4': 4, 'FIPS 180-4': 2, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-4': 1}, 'NIST': {'NIST SP 800-67': 5, 'NIST SP 800-38A': 6, 'NIST SP 800-38B': 3}, 'PKCS': {'PKCS #1': 2}, 'BSI': {'AIS31': 3, 'AIS20': 2, 'AIS26': 2, 'AIS 26': 1, 'AIS 31': 1}, 'RFC': {'RFC 5639': 9}, 'ISO': {'ISO/IEC 7816': 6, 'ISO/IEC 14443': 2, 'ISO/IEC 9797-1': 4, 'ISO/IEC 14888-3': 3, 'ISO/IEC 11770-3': 2}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1136-V4-2024': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 6': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1, 'ALC_FLR': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 1, 'NXP Semiconductors': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 1136V4b_pdf.pdf.
    • The cert_filename property was set to 1136V4c_pdf.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-2300154-01-CR', 'NSCIB-CC-2300155-01-CR', 'NSCIB-CC-2300157-01-CR', 'NSCIB-CC-2300172-01-CR', 'NSCIB-CC-2300156-01-CR']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-2300154-01-CR', 'NSCIB-CC-2300155-01-CR', 'NSCIB-CC-2300157-01-CR', 'NSCIB-CC-2300172-01-CR', 'NSCIB-CC-2300156-01-CR']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4b_pdf.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '18e53403fd0bf68e2f2280b39beea2ef68004621590e50ce10af1e095fcc8869', 'txt_hash': '985a08775c97ec1789d0de44a669f6d85fac2fb45d132537090db26c4cefbfc1'} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 573114, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 39, '/Author': 'Federal Office for Information Security', '/Keywords': '"Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller"', '/Subject': 'Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller', '/Title': 'Certification Report BSI-DSZ-CC-1136-V4-2024', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/cc/', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/', 'https://www.commoncriteriaportal.org/']}}.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1136-V4-2024', 'cert_item': 'NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1 valid until: 04 March 2029'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1136-V4-2024': 22, 'BSI-DSZ-CC-1136-V3-2022': 3, 'BSI-DSZ-CC-1136-V2-2022': 1, 'BSI-DSZ-CC-1136-V4-': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 4}}, 'cc_security_level': {'EAL': {'EAL 6': 5, 'EAL 5': 4, 'EAL 2': 3, 'EAL 1': 1, 'EAL 4': 1, 'EAL 5+': 1, 'EAL 6 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 5, 'ALC_FLR': 3, 'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 4}}, 'cc_sfr': {'FCS': {'FCS_COP': 1}}, 'cc_claims': {'O': {'O.C': 2}, 'R': {'R.O': 2}}, 'vendor': {'NXP': {'NXP': 126, 'NXP Semiconductors': 42}}, 'eval_facility': {'TUV': {'TĂśV Informationstechnik': 4}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 31}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 11, 'Triple-DES': 6, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 6, 'CMAC': 11}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 18}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 8}, 'KEX': {'Key Exchange': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 11}}, 'cipher_mode': {'ECB': {'ECB': 4}, 'CBC': {'CBC': 8}, 'CTR': {'CTR': 6}, 'OFB': {'OFB': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library 0.7.6': 1, 'Crypto Library 0.7.7': 1, 'Crypto Library v0.7.6': 4, 'Crypto Library v0.7.7': 3}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side-channel': 1, 'DPA': 2, 'SPA': 1}, 'FI': {'fault injection': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS197': 15, 'FIPS 186-4': 2, 'FIPS186-4': 5, 'FIPS180-4': 3}, 'NIST': {'NIST SP 800-90A': 1, 'NIST SP 800-108': 1}, 'PKCS': {'PKCS #1': 10}, 'BSI': {'AIS 34': 2, 'AIS 25': 2, 'AIS 37': 2, 'AIS 31': 2, 'AIS 36': 2, 'AIS31': 1, 'AIS20': 3, 'AIS 20': 2, 'AIS 35': 2, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 26': 1, 'AIS 32': 1, 'AIS 39': 1, 'AIS 46': 1, 'AIS 47': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2, 'ISO/IEC 14888-3': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report NXP Secure Smart Card Controller N7121 with IC Dedicated Software': 1, '2024, Version 2, 2024-02-20, Evaluation Technical Report Summary, TĂśV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January': 1, 'Evaluation Technical Report For Composite Evaluation (ETR Comp), TĂśV Informationstechnik GmbH (confidential document) [11] SmartMX3 family N7121, Wafer and delivery specification, Version 3.3, 2021-08-27, NXP': 1, 'confidential document) [12] NXP Secure Smart Card Controller N7121, Information on Guidance and Operation, Version 3.2': 1, 'NXP Semiconductors (confidential document) [13] NXP Secure Smart Card Controller N7121, Overview Product data sheet, Version 3.3, 2020-04-15': 1}}}.
    • The cert_keywords property was set to None.
    • The report_filename property was set to 1136V4a_pdf.pdf.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The st_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-2300156-01-CR', 'NSCIB-CC-2300154-01-CR', 'NSCIB-CC-2300155-01-CR', 'NSCIB-CC-2300157-01-CR']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-2300156-01-CR', 'NSCIB-CC-2300154-01-CR', 'NSCIB-CC-2300155-01-CR', 'NSCIB-CC-2300157-01-CR']}}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-V2-2022', 'BSI-DSZ-CC-1136-V3-2022']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-V2-2022', 'BSI-DSZ-CC-1136-V3-2022', 'BSI-DSZ-CC-1136-2021']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}]} values added.
  • 05.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}]} values discarded.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4c_pdf.pdf",
  "dgst": "ba8d9fb5fd39868c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1136-V4-2024",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300157-01-CR",
          "NSCIB-CC-2300172-01-CR",
          "NSCIB-CC-2300155-01-CR",
          "NSCIB-CC-2300156-01-CR",
          "NSCIB-CC-2300154-01-CR"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-V2-2022",
          "BSI-DSZ-CC-1136-V3-2022"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300157-01-CR",
          "NSCIB-CC-2400004-01-CR",
          "NSCIB-CC-2300172-01-CR",
          "NSCIB-CC-2300155-01-CR",
          "NSCIB-CC-2300156-01-CR",
          "NSCIB-CC-2300154-01-CR"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021",
          "BSI-DSZ-CC-1136-V2-2022",
          "BSI-DSZ-CC-1136-V3-2022"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300157-01-CR",
          "NSCIB-CC-2300172-01-CR",
          "NSCIB-CC-2300155-01-CR",
          "NSCIB-CC-2300156-01-CR",
          "NSCIB-CC-2300154-01-CR"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300157-01-CR",
          "NSCIB-CC-2400004-01-CR",
          "NSCIB-CC-2300172-01-CR",
          "NSCIB-CC-2300155-01-CR",
          "NSCIB-CC-2300156-01-CR",
          "NSCIB-CC-2300154-01-CR"
        ]
      },
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)",
  "not_valid_after": "2029-03-05",
  "not_valid_before": "2024-03-05",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1136V4c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V4-2024": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.1": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 5": 1,
          "EAL 6": 1,
          "EAL 6 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Federal Office for Information Security",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller",
      "/Title": "Certificate BSI-DSZ-CC-1136-V4-2024",
      "pdf_file_size_bytes": 235369,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1136V4a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1 valid until: 04 March 2029",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1136-V4-2024",
        "cert_item": "NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4",
        "cert_lab": "BSI",
        "developer": "NXP Semiconductors Germany GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 18
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 5
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V2-2022": 1,
          "BSI-DSZ-CC-1136-V3-2022": 3,
          "BSI-DSZ-CC-1136-V4-": 1,
          "BSI-DSZ-CC-1136-V4-2024": 22
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 2
        },
        "R": {
          "R.O": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 4
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 3,
          "ALC_FLR.1": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_TSS.2": 4
        },
        "ATE": {
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 4": 1,
          "EAL 5": 4,
          "EAL 5+": 1,
          "EAL 6": 5,
          "EAL 6 augmented": 3
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_COP": 1
        }
      },
      "certification_process": {
        "ConfidentialDocument": {
          "2024, Version 2, 2024-02-20, Evaluation Technical Report Summary, T\u00dcV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January": 1,
          "Evaluation Technical Report For Composite Evaluation (ETR Comp), T\u00dcV Informationstechnik GmbH (confidential document) [11] SmartMX3 family N7121, Wafer and delivery specification, Version 3.3, 2021-08-27, NXP": 1,
          "N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report NXP Secure Smart Card Controller N7121 with IC Dedicated Software": 1,
          "NXP Semiconductors (confidential document) [13] NXP Secure Smart Card Controller N7121, Overview Product data sheet, Version 3.3, 2020-04-15": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "confidential document) [12] NXP Secure Smart Card Controller N7121, Information on Guidance and Operation, Version 3.2": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 8
        },
        "CTR": {
          "CTR": 6
        },
        "ECB": {
          "ECB": 4
        },
        "OFB": {
          "OFB": 4
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library 0.7.6": 1,
          "Crypto Library 0.7.7": 1,
          "Crypto Library v0.7.6": 4,
          "Crypto Library v0.7.7": 3
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 2
        },
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 11
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 1,
          "side-channel": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 14": 1,
          "AIS 19": 1,
          "AIS 20": 2,
          "AIS 25": 2,
          "AIS 26": 1,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 2,
          "AIS 37": 2,
          "AIS 39": 1,
          "AIS 46": 1,
          "AIS 47": 1,
          "AIS20": 3,
          "AIS31": 1
        },
        "FIPS": {
          "FIPS 186-4": 2,
          "FIPS180-4": 3,
          "FIPS186-4": 5,
          "FIPS197": 15
        },
        "ISO": {
          "ISO/IEC 14888-3": 1,
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        },
        "NIST": {
          "NIST SP 800-108": 1,
          "NIST SP 800-90A": 1
        },
        "PKCS": {
          "PKCS #1": 10
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 31
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 11,
            "Triple-DES": 6
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 6,
            "CMAC": 11
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 126,
          "NXP Semiconductors": 42
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Federal Office for Information Security",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller",
      "/Title": "Certification Report BSI-DSZ-CC-1136-V4-2024",
      "pdf_file_size_bytes": 573114,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.sogis.eu/",
          "https://www.commoncriteriaportal.org/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierungsreporte"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 39
    },
    "st_filename": "1136V4b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 50
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 12
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.AES": 4,
          "O.ECC": 4,
          "O.PUF": 4,
          "O.RND": 5,
          "O.RSA": 4,
          "O.SHA": 3,
          "O.TDES": 5
        },
        "T": {
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084-2014": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_CMC.4": 1,
          "ADV_CMC.5": 1,
          "ADV_CMS.4": 1,
          "ADV_CMS.5": 1,
          "ADV_FSP.4": 4,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 2,
          "ADV_IMP.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM.1": 8,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 2,
          "ALC_CMS": 1,
          "ALC_CMS.4": 3,
          "ALC_CMS.5": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.2": 2,
          "ALC_FLR.1": 6,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.2": 7
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_COV.3": 2,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 3,
          "EAL4 augmented": 1,
          "EAL4+": 1,
          "EAL6": 46,
          "EAL6 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 5,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 65,
          "FCS_CKM.1": 5,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 20,
          "FCS_CKM.5": 4,
          "FCS_CKM.5.1": 1,
          "FCS_COP": 45,
          "FCS_COP.1": 14,
          "FCS_RNG": 16,
          "FCS_RNG.1": 8
        },
        "FDP": {
          "FDP_ACC": 14,
          "FDP_ACC.1": 7,
          "FDP_ACF": 16,
          "FDP_ACF.1": 10,
          "FDP_IFC.1": 11,
          "FDP_IFC.1.1": 1,
          "FDP_ITC.1": 19,
          "FDP_ITC.2": 19,
          "FDP_ITT.1": 7,
          "FDP_ITT.1.1": 1,
          "FDP_MSA": 4,
          "FDP_SDC.1": 4,
          "FDP_SDC.1.1": 1,
          "FDP_SDI.2": 5,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UCT": 6,
          "FDP_UCT.1": 1,
          "FDP_UIT": 5,
          "FDP_UIT.1": 2
        },
        "FMT": {
          "FMT_LIM": 13,
          "FMT_LIM.1": 8,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 8,
          "FMT_LIM.2.1": 1,
          "FMT_MSA": 13,
          "FMT_MSA.1": 2,
          "FMT_MSA.3": 5,
          "FMT_SMF.1": 8,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 2,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 7,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 1,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 8,
          "FRU_FLT.2.1": 1
        },
        "FTP": {
          "FTP_ITC": 6,
          "FTP_ITC.1": 5,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library 0.7.6": 4,
          "Crypto Library 0.7.7": 4
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 2
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "KEX": {
          "Key Exchange": 3
        },
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {
        "ANSSI": {
          "ANSSI FRP256v1": 3
        },
        "Brainpool": {
          "brainpoolP224r1": 3,
          "brainpoolP224t1": 3,
          "brainpoolP256r1": 4,
          "brainpoolP256t1": 4,
          "brainpoolP320r1": 3,
          "brainpoolP320t1": 3,
          "brainpoolP384r1": 4,
          "brainpoolP384t1": 4,
          "brainpoolP512r1": 4,
          "brainpoolP512t1": 4
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-224": 4,
            "SHA-256": 4,
            "SHA-384": 4,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 7,
          "RNG": 33
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 7,
          "fault injection": 2,
          "malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 7,
          "Physical Probing": 2,
          "physical probing": 2,
          "side channel": 6
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 26": 1,
          "AIS 31": 1,
          "AIS20": 2,
          "AIS26": 2,
          "AIS31": 3
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS 180-4": 2,
          "FIPS 186-4": 4,
          "FIPS 197": 5,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 1
        },
        "ISO": {
          "ISO/IEC 11770-3": 2,
          "ISO/IEC 14443": 2,
          "ISO/IEC 14888-3": 3,
          "ISO/IEC 7816": 6,
          "ISO/IEC 9797-1": 4
        },
        "NIST": {
          "NIST SP 800-38A": 6,
          "NIST SP 800-38B": 3,
          "NIST SP 800-67": 5
        },
        "PKCS": {
          "PKCS #1": 2
        },
        "RFC": {
          "RFC 5639": 9
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 44,
            "AES-": 1,
            "AES-128": 2
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 32,
            "Triple-DES": 8
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 6,
            "CMAC": 5,
            "HMAC": 1
          }
        },
        "miscellaneous": {
          "SEED": {
            "SEED": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110-1": 1,
          "BSI TR-03110-2": 1,
          "BSI TR-03110-3": 1,
          "BSI TR-03110-4": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 392,
          "NXP Semiconductors": 26
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP B.V.",
      "/Keywords": "Common Criteria, Security Target, Security IC, N7121",
      "/Subject": "NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)",
      "/Title": "Security Target Lite",
      "pdf_file_size_bytes": 777912,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 84
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "BAROC_SC_PP_V1.0",
            "JAVA_OC",
            "SECURITY_IC_AUGP_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
        "pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ASE_TSS.2",
      "EAL6+",
      "ALC_FLR.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "266e3dee69a8d024ad80851a0e2cc977f1589718dee016ebc2e6b14a1a13f7f4",
      "txt_hash": "0c22211ca9b5526949efbf0b2f0f46eb3c81d2d1b8ba2a4964c8a752a9014252"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "18e53403fd0bf68e2f2280b39beea2ef68004621590e50ce10af1e095fcc8869",
      "txt_hash": "985a08775c97ec1789d0de44a669f6d85fac2fb45d132537090db26c4cefbfc1"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e8618a61e968de23b339cd627b2dc8054a1682e373bef85ce5905c41150832e6",
      "txt_hash": "cf777065dbef7ce344f2e867ebb1e58cec4cada57a1632bcadddddbd97b6a5ae"
    }
  },
  "status": "active"
}