name |
V3Pro2004 and AhnLab Policy Center 3.0 |
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
KR |
DE |
status |
archived |
active |
not_valid_after |
01.06.2019 |
05.03.2029 |
not_valid_before |
17.09.2007 |
05.03.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-EN.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-73-ST-EN.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4b_pdf.pdf |
manufacturer |
AhnLab, Inc. |
NXP Semiconductors Germany GmbH |
manufacturer_web |
https://www.ahnlab.com/ |
https://www.nxp.com |
security_level |
EAL4 |
EAL6+, ALC_FLR.1, ASE_TSS.2 |
dgst |
a8f7a4c49c242ddc |
ba8d9fb5fd39868c |
heuristics/cert_id |
KECS-ISIS-0073-2007 |
BSI-DSZ-CC-1136-V4-2024 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_IND.2, ALC_DVS.1, ADV_FSP.2, ATE_FUN.1, ADV_SPM.1, ATE_COV.2, AGD_USR.1, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, ALC_TAT.1, AVA_MSU.2, ADV_HLD.2, AVA_VLA.2, ALC_LCD.1, ATE_DPT.1, AVA_SOF.1, ADV_IMP.1 |
ADV_IMP.2, ADV_ARC.1, AVA_VAN.5, ADV_FSP.5, ALC_CMC.5, ADV_TDS.5, AGD_OPE.1, ATE_DPT.3, ADV_CMS.5, ATE_COV.3, ASE_TSS.2, ASE_REQ.2, ADV_SPM.1, ATE_FUN.2, ADV_CMC.5, ALC_DVS.2, AGD_PRE.1, ATE_IND.2, ASE_CCL.1, ASE_ECD.1, ADV_INT.3, ALC_DEL.1, ASE_OBJ.2, ALC_FLR.1, ASE_INT.1, ASE_SPD.1, ALC_TAT.3, ALC_CMS.5, ALC_LCD.1 |
heuristics/extracted_versions |
3.0 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
NSCIB-CC-2300172-01-CR, ANSSI-CC-2020/72-R01, NSCIB-CC-2300154-01-CR, ANSSI-CC-2021/20-R01, ANSSI-CC-2020/73-R01, ANSSI-CC-2020/10-R01, NSCIB-CC-2300155-01-CR, ANSSI-CC-2021/19-R01, NSCIB-CC-2300157-01-CR, ANSSI-CC-2021/18-R01, ANSSI-CC-2025/01, NSCIB-CC-2300156-01-CR, ANSSI-CC-2025/02 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-1136-V2-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
NSCIB-CC-2300172-01-CR, ANSSI-CC-2020/72-R01, NSCIB-CC-2300154-01-CR, ANSSI-CC-2021/20-R01, ANSSI-CC-2020/73-R01, ANSSI-CC-2020/10-R01, NSCIB-CC-2300155-01-CR, ANSSI-CC-2021/19-R01, NSCIB-CC-2300157-01-CR, ANSSI-CC-2025/01, ANSSI-CC-2021/18-R01, NSCIB-CC-2300156-01-CR, ANSSI-CC-2025/02, NSCIB-CC-2400004-01-CR |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-2021, BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-1136-V3-2022 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
NSCIB-CC-2300172-01-CR, ANSSI-CC-2020/72-R01, NSCIB-CC-2300154-01-CR, ANSSI-CC-2021/20-R01, ANSSI-CC-2020/73-R01, ANSSI-CC-2020/10-R01, NSCIB-CC-2300155-01-CR, ANSSI-CC-2021/19-R01, NSCIB-CC-2300157-01-CR, ANSSI-CC-2021/18-R01, ANSSI-CC-2025/01, NSCIB-CC-2300156-01-CR, ANSSI-CC-2025/02 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
NSCIB-CC-2300172-01-CR, ANSSI-CC-2020/72-R01, NSCIB-CC-2300154-01-CR, ANSSI-CC-2021/20-R01, ANSSI-CC-2020/73-R01, ANSSI-CC-2020/10-R01, NSCIB-CC-2300155-01-CR, ANSSI-CC-2021/19-R01, NSCIB-CC-2300157-01-CR, ANSSI-CC-2025/01, ANSSI-CC-2021/18-R01, NSCIB-CC-2300156-01-CR, ANSSI-CC-2025/02, NSCIB-CC-2400004-01-CR |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
|
1136V4c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V4-2024: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 1
- EAL 6: 1
- EAL 6 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- NXP:
- NXP: 1
- NXP Semiconductors: 1
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller"
- /Subject: Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller
- /Title: Certificate BSI-DSZ-CC-1136-V4-2024
- pdf_file_size_bytes: 235369
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
ISIS-73-EN.pdf |
1136V4a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1 valid until: 04 March 2029
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1136-V4-2024
- cert_item: NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V2-2022: 1
- BSI-DSZ-CC-1136-V3-2022: 3
- BSI-DSZ-CC-1136-V4-: 1
- BSI-DSZ-CC-1136-V4-2024: 22
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 5
- EAL 6 augmented: 3
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.AVCONFILICT: 1
- A.CERT: 1
- A.GUARD: 1
- A.INTERNALENTITY: 1
- A.NO_EVIL: 1
- A.PHYSICAL: 1
- A.SAFEITENTITY: 1
- A.TIMESTAMP: 1
- O:
- O.ADMIN_ROLE: 1
- O.ALARM: 1
- O.AUDIT: 1
- O.INA: 1
- O.MANAGE: 1
- O.SECURE_UPDATE: 1
- O.SELF_PROTECTION: 1
- O.STRENGTHENOS: 1
- O.TSFDATA_PROTECT: 1
- O.VIRUS: 1
- OE:
- OE.AUDIT_SEARCH: 1
- OE.AUDIT_STORAGE: 1
- OE.AVCONFLICT: 1
- OE.CERT: 1
- OE.DOM_SEPARATION: 1
- OE.GUARD: 1
- OE.INTERNALENTITY: 1
- OE.NO_BYPASS: 1
- OE.NO_EVIL: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFO: 1
- OE.SAFEITENTITY: 1
- OE.TIMESTAMP: 1
- OE.TOE_ACCESS: 1
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 126
- NXP Semiconductors: 42
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 11
- Triple-DES: 6
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- Generic:
- Crypto Library 0.7.6: 1
- Crypto Library 0.7.7: 1
- Crypto Library v0.7.6: 4
- Crypto Library v0.7.7: 3
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 1
- side-channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 2
- AIS 25: 2
- AIS 26: 1
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 2
- AIS 37: 2
- AIS 39: 1
- AIS 46: 1
- AIS 47: 1
- AIS20: 3
- AIS31: 1
- FIPS:
- FIPS 186-4: 2
- FIPS180-4: 3
- FIPS186-4: 5
- FIPS197: 15
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-90A: 1
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- If the administrator does not set the V3 security lock with Policy Agent in passive mode, it is out of scope of the evaluation because it is not enterprise environment, the TOE operating environment: 1
- out of scope: 1
|
- ConfidentialDocument:
- 2024, Version 2, 2024-02-20, Evaluation Technical Report Summary, TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- Evaluation Technical Report For Composite Evaluation (ETR Comp), TÜV Informationstechnik GmbH (confidential document) [11] SmartMX3 family N7121, Wafer and delivery specification, Version 3.3, 2021-08-27, NXP: 1
- N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report NXP Secure Smart Card Controller N7121 with IC Dedicated Software: 1
- NXP Semiconductors (confidential document) [13] NXP Secure Smart Card Controller N7121, Overview Product data sheet, Version 3.3, 2020-04-15: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- confidential document) [12] NXP Secure Smart Card Controller N7121, Information on Guidance and Operation, Version 3.2: 1
|
pdf_data/report_metadata |
- /Author: KYH
- /CreationDate: D:20071203103449+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20071203103449+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: ISIS-73-EN.hwp
- pdf_file_size_bytes: 330437
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller"
- /Subject: Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller
- /Title: Certification Report BSI-DSZ-CC-1136-V4-2024
- pdf_file_size_bytes: 573114
- pdf_hyperlinks: https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.sogis.eu/, http://www.commoncriteriaportal.org/cc/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
pdf_data/st_filename |
ISIS-73-ST-EN.pdf |
1136V4b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
- EAL6: 46
- EAL6 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP.2: 3
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.2: 2
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_LLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 2
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 2
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 3
- ATE_FUN.1: 2
- ATE_IND.2: 3
- AVA:
- AVA_MSU.2: 4
- AVA_SOF.1: 2
- AVA_VLA.2: 3
|
- ADV:
- ADV_ARC.1: 2
- ADV_CMC.4: 1
- ADV_CMC.5: 1
- ADV_CMS.4: 1
- ADV_CMS.5: 1
- ADV_FSP.4: 4
- ADV_FSP.5: 8
- ADV_IMP.1: 2
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 8
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMC.5: 2
- ALC_CMS: 1
- ALC_CMS.4: 3
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.2: 2
- ALC_FLR.1: 6
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 7
- ATE:
- ATE_COV.2: 2
- ATE_COV.3: 2
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_APR.1: 2
- FAU_ARP.1: 10
- FAU_ARP.1.1: 1
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAA.1: 13
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 20
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.2: 12
- FAU_SAR.2.1: 1
- FAU_SAR.3: 13
- FAU_SAR.3.1: 2
- FAU_SSA.1: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 11
- FAU_STG.4.1: 1
- FDP:
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 10
- FIA_SOS.1.1: 1
- FIA_UAU.1: 6
- FIA_UAU.2: 16
- FIA_UAU.2.1: 2
- FIA_UAU.6: 14
- FIA_UAU.6.1: 2
- FIA_UID.1: 8
- FIA_UID.2: 18
- FIA_UID.2.1: 2
- FMT:
- FMT_MOF.1: 27
- FMT_MOF.1.1: 1
- FMT_MTD.1: 32
- FMT_MTD.1.1: 1
- FMT_MTD.2: 12
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMF.1: 31
- FMT_SMF.1.1: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 10
- FPT_AMT.1.1: 1
- FPT_ITI.1: 10
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_ITT.1: 16
- FPT_ITT.1.1: 2
- FPT_SSL.3: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.1: 5
- FTA_SSL.1.1: 1
- FTA_SSL.1.2: 1
- FTA_SSL.3: 15
- FTA_SSL.3.1: 1
- FTA_SSL.4: 14
- FTA_SSL.4.1: 1
|
- FAU:
- FAU_SAS.1: 5
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 65
- FCS_CKM.1: 5
- FCS_CKM.2: 4
- FCS_CKM.4: 20
- FCS_CKM.5: 4
- FCS_CKM.5.1: 1
- FCS_COP: 45
- FCS_COP.1: 14
- FCS_RNG: 16
- FCS_RNG.1: 8
- FDP:
- FDP_ACC: 14
- FDP_ACC.1: 7
- FDP_ACF: 16
- FDP_ACF.1: 10
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_ITC.1: 19
- FDP_ITC.2: 19
- FDP_ITT.1: 7
- FDP_ITT.1.1: 1
- FDP_MSA: 4
- FDP_SDC.1: 4
- FDP_SDC.1.1: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 6
- FDP_UCT.1: 1
- FDP_UIT: 5
- FDP_UIT.1: 2
- FMT:
- FMT_LIM: 13
- FMT_LIM.1: 8
- FMT_LIM.1.1: 1
- FMT_LIM.2: 8
- FMT_LIM.2.1: 1
- FMT_MSA: 13
- FMT_MSA.1: 2
- FMT_MSA.3: 5
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT.2: 8
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 5
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AVCONFLICT: 3
- A.CERT: 3
- A.GUARD: 3
- A.INTERNALENTITY: 3
- A.NO_EVIL: 3
- A.PHISICAL: 2
- A.SAFEITENTITY: 3
- A.TIMESTAMP: 3
- O:
- O.ADMIN_ROLE: 5
- O.ALARM: 6
- O.AUDIT: 10
- O.AUIDT: 2
- O.INA: 16
- O.MANAGE: 14
- O.SECURE_UPDATE: 6
- O.SELF_PROTECTION: 5
- O.STRENGTHENOS: 5
- O.TSFDATA_PROTECT: 8
- O.VIRUS: 10
- OE:
- OE.AUDIT_SEARCH: 5
- OE.AUDIT_STORAGE: 7
- OE.AVCONFLICT: 3
- OE.CERT: 3
- OE.DOM_SEPARATION: 5
- OE.GAURD: 1
- OE.GUARD: 2
- OE.INTERNALENTITY: 3
- OE.NO_BYPASS: 5
- OE.NO_EVIL: 3
- OE.PHISICAL: 2
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFO: 2
- OE.SAFEITENTITY: 4
- OE.TIMESTAMP: 7
- OE.TOE_ACCESS: 13
- T:
- T.AUDIT_COMPROMISE: 8
- T.DOWN_INTERFERENCE: 3
- T.MASQUERADE: 5
- T.RESIDUAL_DATA: 3
- T.TRANS_DESTORY: 3
- T.TSF_COMPROMISE: 9
- T.UNATTEND_SESS: 5
- T.UNIDENTIFIED_ACTIONS: 5
- T.VIRUS: 4
|
- O:
- O.AES: 4
- O.ECC: 4
- O.PUF: 4
- O.RND: 5
- O.RSA: 4
- O.SHA: 3
- O.TDES: 5
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 392
- NXP Semiconductors: 26
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 44
- AES-: 1
- AES-128: 2
- DES:
- 3DES:
- TDEA: 1
- TDES: 32
- Triple-DES: 8
- DES:
- constructions:
- MAC:
- CBC-MAC: 6
- CMAC: 5
- HMAC: 1
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 4
- SHA-384: 4
- SHA-512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- ANSSI:
- Brainpool:
- brainpoolP224r1: 3
- brainpoolP224t1: 3
- brainpoolP256r1: 4
- brainpoolP256t1: 4
- brainpoolP320r1: 3
- brainpoolP320t1: 3
- brainpoolP384r1: 4
- brainpoolP384t1: 4
- brainpoolP512r1: 4
- brainpoolP512t1: 4
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library 0.7.6: 4
- Crypto Library 0.7.7: 4
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 7
- fault injection: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 7
- Physical Probing: 2
- physical probing: 2
- side channel: 6
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03110-1: 1
- BSI TR-03110-2: 1
- BSI TR-03110-3: 1
- BSI TR-03110-4: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 26: 1
- AIS 31: 1
- AIS20: 2
- AIS26: 2
- AIS31: 3
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 180-4: 2
- FIPS 186-4: 4
- FIPS 197: 5
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- ISO:
- ISO/IEC 11770-3: 2
- ISO/IEC 14443: 2
- ISO/IEC 14888-3: 3
- ISO/IEC 7816: 6
- ISO/IEC 9797-1: 4
- NIST:
- NIST SP 800-38A: 6
- NIST SP 800-38B: 3
- NIST SP 800-67: 5
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- 98 APC uses SMS for notification on the situation that authorized administrator is set. This is out of scope because additional contract with a mobile service provider is necessary for this function. APC: 1
- 99 APC creates reports with pre-defined formats and audit records. This function is out of scope since it is independent with generating and storing audit records. AhnLab, Korea 24/109 APC: 1
- files for support of V3+ Neo. Since the operating system of the TOE is Windows XP, This is out of scope. 91 The following functions are out of scope for policy server. Hierarchical Domain Management : 1
- out of scope: 6
- system in case that the system has been registered on the APC. 101 The following functions are out of scope for policy agent. User Information Input 102 An additional feature for the Policy Agent user: 1
- updates itself by the policy server’s command. 2.2.3 Out of Coverage 88 The following functions are out of scope of V3 Run as a Update Server 89 Without APC, V3 runs as an update server for the other V3s. V3 +: 1
|
|
pdf_data/st_metadata |
- /Author: KYH
- /CreationDate: D:20071203103747+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20071203103747+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: Microsoft Word - ISIS-73-ST_EN.doc
- pdf_file_size_bytes: 796288
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 109
|
- /Author: NXP B.V.
- /Keywords: Common Criteria, Security Target, Security IC, N7121
- /Subject: NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
- /Title: Security Target Lite
- pdf_file_size_bytes: 777912
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 84
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |