This page was not yet optimized for use on mobile
devices.
NXP SXF1800HN/V102B
CSV information
| Status | active |
|---|---|
| Valid from | 18.12.2023 |
| Valid until | 18.12.2028 |
| Scheme | 🇳🇱 NL |
| Manufacturer | NXP Semiconductors Germany GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4+, ALC_FLR.1, ALC_DVS.2, AVA_VAN.5 |
| Protection profiles |
Heuristics summary
Certificate ID: NSCIB-CC-2300149-01-CR
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Vendor
NXP SemiconductorsSecurity level
EAL 4, EAL2, EAL 7, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ALC_FLR.3, ALC_FLR, AVA_VAN.5Protection profiles
BSI-CC-PP-0114-2021Certificates
NSCIB-CC-2300149-01, NSCIB-2300149-01, CC-19-235750Evaluation facilities
RiscureStandards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008Certification report
Extracted keywords
Symmetric Algorithms
RC2Asymmetric Algorithms
ECDSA, ECIESJavaCard versions
GlobalPlatform 2.2.1Operating System name
JCOP 4Trusted Execution Environments
SEVendor
NXP Semiconductors, NXPSecurity level
EAL4, EAL4+, EAL 4, EAL4 augmented, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ATE_COV.2, ATE_DPT.1, AVA_VAN.5Protection profiles
BSI-CC-PP-0114-2021Certificates
ANSSI-CC-2019/62, ANSSI-CC-2019/62-M01, NSCIB-CC-2300149-01-CR, NSCIB-2300149-01, CC-19-235750Evaluation facilities
RiscureSide-channel analysis
side-channel, JIL, JIL-AAPSStandards
SCP03File metadata
| Title | Certification Report |
|---|---|
| Author | Microsoft Office User |
| Creation date | D:20240124171529+00'00' |
| Modification date | D:20240124171529+00'00' |
| Pages | 13 |
| Creator | Microsoft® Word 2021 |
| Producer | Microsoft® Word 2021 |
Frontpage
| Certificate ID | NSCIB-CC-2300149-01-CR |
|---|---|
| Certified item | SXF1800HN/V102B |
| Certification lab | Riscure B.V. |
| Developer | NXP Semiconductors Germany GmbH |
References
Outgoing- ANSSI-CC-2019/62 - active - P73N2M0B0.2C2/2C6, Version B0.2
Security target
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-192, AES-256, RC2, HMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECIES, ECCHash functions
SHA-256Schemes
MAC, Key AgreementRandomness
RNGElliptic Curves
P-256, P-384, NIST P-256, NIST P-384Block cipher modes
CBCJavaCard versions
GlobalPlatform 2.2.1Operating System name
JCOP4, JCOP 4Trusted Execution Environments
SEVendor
NXP, NXP Semiconductors, NXP Semiconductors N.VSecurity level
EAL4, EAL 4, EAL4+, EAL4 augmented, EAL 4 augmentedClaims
O.C, O.RNG, T.VCS_DATA_MODIF, T.VCS_DATA_DISCLOSE, T.SW_TAMPER, T.SW_REPLACE, T.SW_UPDATE, T.SRV_MALFUNCTION, T.KEY_REPLACE, T.KEY_DISCLOSE, T.SW_, A.KEY_EXT_MNGT, A.INTEGRATION, R.O, R.VCS, R.NXP, OT.TOE_CONFIG, OT.ATTACK_COUNTER, OT.RESTRICTED_MODE, OT.KEY_MANAGEMENT, OT.KEY_DERIVE, OT.PRIVKEY_IMPORT_TC, OT.SIGNATURE_GENERATION, OT.ECIES, OT.RNG, OT.VCS_DATA, OT.ACCESS_CONTROL, OT.TRUSTED_CHANNEL, OT.SW_UPDATE, OT.TOE_SELF_PROTECTION, OT.PRIVKEY_ACCESS, OT.AUTHENTICATION, OP.RNG, OP.SWU, OE.SRV_ACCESS, OE.TRUSTED_CHANNEL, OE.SECURE_COMMUNICATION, OE.KEY_MANAGEMENT, OE.INTEGRATIONSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_TDS.4, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_DEL, ALC_DVS.2, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_RNG.1, FCS_CKM.5, FCS_CKM, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.5.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_RIP.1, FDP_RIP.1.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ITC, FDP_UIT, FDP_UCT, FDP_UIT.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT.1, FDP_UCT.1.1, FDP_ITC.2, FDP_IFC.2, FDP_IFF.1, FDP_ACC.2, FDP_ACC, FDP_ACF, FDP_IFC, FDP_IFF, FDP_MTD.1, FDP_IFC.1, FIA_AFL.1, FIA_AFL, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF, FMT_MSA, FPT_EMS.1, FPT_EMS, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TDC.1, FPT_TDC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_ITCProtection profiles
BSI-CC-PP-0114, BSI-CC-PP-0059, BSI-CC-PP0075Certificates
ANSSI-CC-2019/62-S03Side-channel analysis
side channel, SPA, DPA, timing attacks, physical tampering, malfunction, DFA, fault injectionStandards
FIPS140-2, FIPS 186-4, FIPS PUB 197, SP 800-38A, SP 800-38B, RFC 5639, SCP03, CCMB-2017-04-001, CCMB-2017-04-002File metadata
| Title | ST-SXF1800HN/V102B |
|---|---|
| Author | Jim MacFarlane / Thomas Esbach |
| Creation date | D:20231207231828+01'00' |
| Modification date | D:20231207231849+01'00' |
| Pages | 76 |
| Creator | Power PDF Create |
| Producer | Power PDF Create |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
NSCIB-CC-2300149-01-CRExtracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| NXP SXF1800HN/V102B | NSCIB-CC-235750-CR | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300149-01-Cert.pdf",
"dgst": "c900b63e2cb440e0",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-2300149-01-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"dda09283aab6ad71"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/62"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2018/52",
"ANSSI-CC-2018/55",
"ANSSI-CC-2019/62",
"ANSSI-CC-2018/08",
"ANSSI-CC-2018/19"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "NXP Semiconductors Germany GmbH",
"manufacturer_web": "https://www.nxp.com",
"name": "NXP SXF1800HN/V102B",
"not_valid_after": "2028-12-18",
"not_valid_before": "2023-12-18",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "NSCIB-CC-2300149-01-Cert.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-19-235750": 1,
"NSCIB-2300149-01": 1,
"NSCIB-CC-2300149-01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0114-2021": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 7": 1,
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Riscure": {
"Riscure": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 18045:2008": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "NSCIB-CC-2300149-01-CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-2300149-01-CR",
"cert_item": "SXF1800HN/V102B",
"cert_lab": " Riscure B.V.",
"developer": "NXP Semiconductors Germany GmbH"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDSA": {
"ECDSA": 5
},
"ECIES": {
"ECIES": 1
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2019/62": 1,
"ANSSI-CC-2019/62-M01": 1
},
"NL": {
"CC-19-235750": 1,
"NSCIB-2300149-01": 1,
"NSCIB-CC-2300149-01-CR": 13
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0114-2021": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 2,
"ALC_FLR.1": 2
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1
},
"AVA": {
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL4+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Riscure": {
"Riscure": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.2.1": 1
}
},
"os_name": {
"JCOP": {
"JCOP 4": 3
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"side-channel": 1
},
"other": {
"JIL": 3,
"JIL-AAPS": 1
}
},
"standard_id": {
"SCP": {
"SCP03": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"RC": {
"RC2": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 2
}
},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 1,
"NXP Semiconductors": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Microsoft Office User",
"/CreationDate": "D:20240124171529+00\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20240124171529+00\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "Certification Report",
"pdf_file_size_bytes": 349710,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.sogis.eu/",
"https://trustcb.com/common-criteria/nscib/",
"mailto:[email protected]",
"https://nscib.nl/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "NSCIB-CC-2300149-01-STlite_v2_3.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 24
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 23
},
"ECIES": {
"ECIES": 31
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2019/62-S03": 1
}
},
"cc_claims": {
"A": {
"A.INTEGRATION": 3,
"A.KEY_EXT_MNGT": 4
},
"O": {
"O.C": 1,
"O.RNG": 3
},
"OE": {
"OE.INTEGRATION": 4,
"OE.KEY_MANAGEMENT": 2,
"OE.SECURE_COMMUNICATION": 1,
"OE.SRV_ACCESS": 1,
"OE.TRUSTED_CHANNEL": 6
},
"OP": {
"OP.RNG": 1,
"OP.SWU": 3
},
"OT": {
"OT.ACCESS_CONTROL": 3,
"OT.ATTACK_COUNTER": 4,
"OT.AUTHENTICATION": 3,
"OT.ECIES": 6,
"OT.KEY_DERIVE": 3,
"OT.KEY_MANAGEMENT": 9,
"OT.PRIVKEY_ACCESS": 6,
"OT.PRIVKEY_IMPORT_TC": 6,
"OT.RESTRICTED_MODE": 7,
"OT.RNG": 3,
"OT.SIGNATURE_GENERATION": 3,
"OT.SW_UPDATE": 4,
"OT.TOE_CONFIG": 9,
"OT.TOE_SELF_PROTECTION": 8,
"OT.TRUSTED_CHANNEL": 11,
"OT.VCS_DATA": 7
},
"R": {
"R.NXP": 20,
"R.O": 1,
"R.VCS": 6
},
"T": {
"T.KEY_DISCLOSE": 3,
"T.KEY_REPLACE": 2,
"T.SRV_MALFUNCTION": 4,
"T.SW_": 1,
"T.SW_REPLACE": 3,
"T.SW_TAMPER": 4,
"T.SW_UPDATE": 3,
"T.VCS_DATA_DISCLOSE": 4,
"T.VCS_DATA_MODIF": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059": 1,
"BSI-CC-PP-0114": 1,
"BSI-CC-PP0075": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 5,
"ADV_FSP.4": 7,
"ADV_IMP.1": 4,
"ADV_TDS.1": 1,
"ADV_TDS.3": 5,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE.1": 5,
"AGD_PRE.1": 7
},
"ALC": {
"ALC_CMC.4": 2,
"ALC_CMS.4": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS.2": 8,
"ALC_FLR.1": 7,
"ALC_LCD.1": 3,
"ALC_TAT.1": 1,
"ALC_TAT.2": 2
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 1,
"ASE_INT.1": 4,
"ASE_OBJ.2": 3,
"ASE_REQ.2": 4,
"ASE_SPD.1": 1,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.2": 4,
"ATE_DPT.1": 2,
"ATE_FUN.1": 4,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 7,
"EAL4 augmented": 4,
"EAL4+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2
},
"FCS": {
"FCS_CKM": 24,
"FCS_CKM.1": 18,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 1,
"FCS_CKM.4": 11,
"FCS_CKM.4.1": 1,
"FCS_CKM.5": 14,
"FCS_CKM.5.1": 1,
"FCS_COP": 49,
"FCS_COP.1": 7,
"FCS_RNG": 7,
"FCS_RNG.1": 16,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 27,
"FDP_ACC.1": 15,
"FDP_ACC.1.1": 1,
"FDP_ACC.2": 4,
"FDP_ACF": 25,
"FDP_ACF.1": 22,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC": 7,
"FDP_IFC.1": 2,
"FDP_IFC.2": 4,
"FDP_IFF": 6,
"FDP_IFF.1": 7,
"FDP_ITC": 14,
"FDP_ITC.1": 7,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 7,
"FDP_MTD.1": 1,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1,
"FDP_SDI.2": 11,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT": 5,
"FDP_UCT.1": 6,
"FDP_UCT.1.1": 1,
"FDP_UIT": 5,
"FDP_UIT.1": 7,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL": 8,
"FIA_AFL.1": 10,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU.1": 13,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 16,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MSA": 38,
"FMT_MSA.1": 18,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 25,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_SMF": 17,
"FMT_SMF.1": 18,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 22,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 7,
"FPT_EMS.1": 21,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 17,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 16,
"FPT_PHP.3.1": 1,
"FPT_TDC": 7,
"FPT_TDC.1": 4,
"FPT_TST": 1,
"FPT_TST.1": 17,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 8,
"FTP_ITC.1": 11,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 4
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-256": 6,
"NIST P-384": 2,
"P-256": 6,
"P-384": 2
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.2.1": 1
}
},
"os_name": {
"JCOP": {
"JCOP 4": 6,
"JCOP4": 4
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 27
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"fault injection": 3,
"malfunction": 2,
"physical tampering": 3
},
"SCA": {
"DPA": 2,
"SPA": 2,
"side channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1
},
"FIPS": {
"FIPS 186-4": 11,
"FIPS PUB 197": 3,
"FIPS140-2": 1
},
"NIST": {
"SP 800-38A": 2,
"SP 800-38B": 1
},
"RFC": {
"RFC 5639": 10
},
"SCP": {
"SCP03": 16
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11,
"AES-128": 2,
"AES-192": 1,
"AES-256": 1
},
"RC": {
"RC2": 1
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 3
}
},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 72,
"NXP Semiconductors": 35,
"NXP Semiconductors N.V": 76
}
},
"vulnerability": {}
},
"st_metadata": {
"/Alternative descriptive title": "Security Target Lite",
"/Author": "Jim MacFarlane / Thomas Esbach",
"/CL": "NCJ38AC B0.2CB",
"/Company": "NXP Semiconductors",
"/Copyright date": "2018",
"/CreationDate": "D:20231207231828+01\u002700\u0027",
"/Creator": "Power PDF Create",
"/Descriptive title": "Security Target Lite",
"/Division": "NXP Semiconductors",
"/Document identifier": "ST-SXF1800HN/V102B",
"/GS": "GS Applet",
"/HSM": "V2X Applet",
"/IC": "NCJ38AC",
"/JC": "JCOP SE 4.4",
"/MSIP_Label_1c2c4696-fedb-40ee-8ff4-14cad4688dc3_ActionId": "8ad969da-b616-4b1c-9245-2c5e3bf911b1",
"/MSIP_Label_1c2c4696-fedb-40ee-8ff4-14cad4688dc3_Application": "Microsoft Azure Information Protection",
"/MSIP_Label_1c2c4696-fedb-40ee-8ff4-14cad4688dc3_Enabled": "True",
"/MSIP_Label_1c2c4696-fedb-40ee-8ff4-14cad4688dc3_Extended_MSFT_Method": "Manual",
"/MSIP_Label_1c2c4696-fedb-40ee-8ff4-14cad4688dc3_Name": "Not Protected",
"/MSIP_Label_1c2c4696-fedb-40ee-8ff4-14cad4688dc3_Owner": "[email protected]",
"/MSIP_Label_1c2c4696-fedb-40ee-8ff4-14cad4688dc3_SetDate": "2023-06-23T16:20:24.7738078Z",
"/MSIP_Label_1c2c4696-fedb-40ee-8ff4-14cad4688dc3_SiteId": "686ea1d3-bc2b-4c6f-a92c-d99c5c301635",
"/ModDate": "D:20231207231849+01\u002700\u0027",
"/Modification date": "30 October 2023",
"/Producer": "Power PDF Create",
"/Product name title": "SXF1800HN/V102B",
"/Revision": "Rev. 2.3",
"/Security status": "COMPANY CONFIDENTIAL",
"/Sensitivity": "Not Protected",
"/Specification status": "Security Target Lite",
"/Template date": "25 November 2014",
"/Template version": "2.11.0A",
"/Title": "ST-SXF1800HN/V102B",
"pdf_file_size_bytes": 971193,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.nxp.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 76
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0114b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300149-01-CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"EAL4+",
"ALC_FLR.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300149-01-STlite_v2_3.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "d7e837f6feb4ec0a39d3a67e5bc44787b2fd88d99f6528c6383f002d88173685",
"txt_hash": "f7c0698b7a433016d918c8943efb2ac611cd9445ddf1f77244983fce69c25820"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "83d2e3d9a5411fb30fd652550fd6d95df86e95b64a71d962d22b9c5f476d2906",
"txt_hash": "b61934bea526d0e2b6553eb5b8d18d0f97a779fd2e145fc79bb1773c39cde1a8"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "8997507507d807ca157d1b7df51560abfb63cec1e5de733407de3d50849afdfa",
"txt_hash": "f371afaa5f688a86b0a50ba386ee50d7eec6140fea1c782cb38e064935fa3967"
}
},
"status": "active"
}