| name |
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4) |
Infineon Smart Card IC (Security Controller) SLE66CX162PE / m1531-a25 and SLE66CX80PE / m1533-a25 all with optional libraries RSA V1.6, EC, V1.1, SHA-2 V1.0 and both with specific IC dedicated software |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
DE |
DE |
| status |
active |
archived |
| not_valid_after |
05.03.2029 |
01.09.2019 |
| not_valid_before |
05.03.2024 |
11.06.2010 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4c_pdf.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0629a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0629b_pdf.pdf |
| manufacturer |
NXP Semiconductors Germany GmbH |
Infineon Technologies AG |
| manufacturer_web |
https://www.nxp.com |
https://www.infineon.com/ |
| security_level |
ASE_TSS.2, ALC_FLR.1, EAL6+ |
AVA_VLA.4, ADV_DVS.2, AVA_MSU.3, EAL5+ |
| dgst |
ba8d9fb5fd39868c |
17b7e7d098546a3e |
| heuristics/cert_id |
BSI-DSZ-CC-1136-V4-2024 |
BSI-DSZ-CC-0629-2010 |
| heuristics/cert_lab |
BSI |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_CMS.5, ADV_INT.3, ADV_IMP.2, ASE_ECD.1, ADV_CMC.5, ATE_FUN.2, AVA_VAN.5, ATE_IND.2, AGD_PRE.1, ADV_CMS.5, ASE_OBJ.2, ADV_TDS.5, ALC_DVS.2, AGD_OPE.1, ASE_TSS.2, ALC_FLR.1, ATE_COV.3, ALC_CMC.5, ADV_SPM.1, ATE_DPT.3, ASE_REQ.2, ALC_TAT.3, ADV_ARC.1, ALC_DEL.1, ASE_INT.1, ASE_CCL.1, ALC_LCD.1, ADV_FSP.5, ASE_SPD.1 |
ATE_COV.2, ADV_HLD.3, AVA_VLA.4, AVA_CCA.1, AGD_USR.1, ADV_DVS.2, ADV_IMP.2, ATE_DPT.2, ATE_IND.2, ADV_FSP.3, ALC_TAT.2, ADV_LLD.1, ALC_DVS.2, ADV_SPM.3, ATE_FUN.1, ADV_INT.1, AVA_MSU.3, AGD_ADM.1, ADV_RCR.2, AVA_SOF.1, ALC_LCD.2 |
| heuristics/extracted_versions |
- |
1.1, 1.0, 1.6 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
ANSSI-CC-2020/73-R01, NSCIB-CC-2300155-01-CR, ANSSI-CC-2021/20-R01v2, ANSSI-CC-2021/19-R01v2, NSCIB-CC-2300172-01-CR, ANSSI-CC-2021/18-R01, ANSSI-CC-2025/03v2, ANSSI-CC-2025/01, ANSSI-CC-2025/02v2, ANSSI-CC-2020/10-R01, NSCIB-CC-2300154-01-CR, NSCIB-CC-2300156-01-CR, NSCIB-CC-2300157-01-CR, ANSSI-CC-2020/72-R01 |
{} |
| heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-1136-V3-2022 |
BSI-DSZ-CC-0470-2008 |
| heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2020/73-R01, NSCIB-CC-2300155-01-CR, ANSSI-CC-2021/19-R01v2, NSCIB-CC-2300172-01-CR, ANSSI-CC-2021/18-R01, ANSSI-CC-2025/03v2, ANSSI-CC-2025/01, ANSSI-CC-2025/02v2, NSCIB-CC-2300157-01-CR, ANSSI-CC-2020/10-R01, NSCIB-CC-2400004-01-CR, NSCIB-CC-2300154-01-CR, NSCIB-CC-2300156-01-CR, ANSSI-CC-2021/20-R01v2, ANSSI-CC-2020/72-R01 |
{} |
| heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1136-2021, BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-1136-V3-2022 |
BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0344-2005, BSI-DSZ-CC-0470-2008, BSI-DSZ-CC-0169-2002 |
| heuristics/scheme_data |
- category: Smart Cards and similar devices
- cert_id: BSI-DSZ-CC-1136-V5-2026
- certification_date: 30.01.2026
- enhanced:
- applicant: NXP Semiconductors Germany GmbH Beiersdorfstraße 12 22529 Hamburg
- assurance_level: EAL6+,ALC_FLR.1,ASE_TSS.2
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1136V5c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 30.01.2026
- description: The TOE is the hard macro “NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2)”, with IC Dedicated Software and an optional crypto Library and documentation describing instruction set and usage of the TOE. N7121 provides high security for smartcard applications and in particular for being used in the banking and finance market, in electronic commerce, or in governmental applications. The TOE does not include a customer-specific Security IC Embedded Software.
- entries: [frozendict({'id': 'BSI', 'description': 'In Comparison to the TOE forerunner, the documentation (Guidance and ST) was changed also a variety of improved Penetration Tests has been conducted, leading to restrictions in the guidance.'}), frozendict({'id': 'BSI', 'description': 'In Comparison to the TOE forerunner, the documentation was changed also a variety of improved Penetration Tests has been conducted, leading to restrictions in the guidance.'}), frozendict({'id': 'BSI-DSZ-CC-1136-V3-2022-MA-01', 'description': 'Re-Evaluation with no changes to the certified product was done. Production and development sites involved in the product life cycle were newly audited or integrated by their re-newed site certificate.'}), frozendict({'id': 'BSI-DSZ-CC-1136-V3-2022 (Ausstellungsdatum / Certification Date 07.09.2022, gültig bis / valid until 06.09.2027) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target Zertifikat / Certificate Der EVG ist der hard-macro Sicherheitscontroller „NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)“, mit spezieller IC-Software, einer zusätzlichen kryptographischen Bibliothek (Crypto Library) und der dazugehörigen Beschreibung des Befehlssatzes und der Nutzung des EVG. Der N7121 bietet hohe Sicherheit für Smartcard Anwendungen, insbesondere für den Einsatz im Banken- und Finanzsektor, im E-Commerce oder in staatlichen Anwendungen. Kundenspezifische eingebettete Software ist nicht Bestandteil des EVG.', 'description': 'Software'}), frozendict({'id': 'BSI-DSZ-CC-1136-V2-2022 (Ausstellungsdatum / Certification Date 07.06.2022, gültig bis / valid until 09.02.2026) Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target Zertifikat / Certificate', 'description': 'Software'}), frozendict({'id': 'BSI', 'description': 'Certificate'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 29.01.2031
- product: NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
- protection_profile: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1136V5a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1136V5b_pdf.pdf?__blob=publicationFile&v=2
- product: NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
- subcategory: ICs, Cryptolib
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1136.html
- vendor: NXP Semiconductors Germany GmbH
|
|
| heuristics/st_references/directly_referenced_by |
ANSSI-CC-2020/73-R01, NSCIB-CC-2300155-01-CR, ANSSI-CC-2021/20-R01v2, ANSSI-CC-2021/19-R01v2, NSCIB-CC-2300172-01-CR, ANSSI-CC-2021/18-R01, ANSSI-CC-2025/03v2, ANSSI-CC-2025/01, ANSSI-CC-2025/02v2, ANSSI-CC-2020/10-R01, NSCIB-CC-2300154-01-CR, NSCIB-CC-2300156-01-CR, NSCIB-CC-2300157-01-CR, ANSSI-CC-2020/72-R01 |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0470-2008 |
| heuristics/st_references/indirectly_referenced_by |
ANSSI-CC-2020/73-R01, NSCIB-CC-2300155-01-CR, ANSSI-CC-2021/19-R01v2, NSCIB-CC-2300172-01-CR, ANSSI-CC-2021/18-R01, ANSSI-CC-2025/03v2, ANSSI-CC-2025/01, ANSSI-CC-2025/02v2, NSCIB-CC-2300157-01-CR, ANSSI-CC-2020/10-R01, NSCIB-CC-2400004-01-CR, NSCIB-CC-2300154-01-CR, NSCIB-CC-2300156-01-CR, ANSSI-CC-2021/20-R01v2, ANSSI-CC-2020/72-R01 |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0470-2008 |
| heuristics/protection_profiles |
cf0f01bcd7be3e9c |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
{} |
| pdf_data/cert_filename |
1136V4c_pdf.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1136-V4-2024: 1
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 5: 1
- EAL 6: 1
- EAL 6 augmented: 1
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
- NXP:
- NXP: 1
- NXP Semiconductors: 1
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
1136V4a_pdf.pdf |
0629a_pdf.pdf |
| pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1 valid until: 04 March 2029
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1136-V4-2024
- cert_item: NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
- DE:
- cert_id: BSI-DSZ-CC-0629-2010
- cert_item: Infineon Smart Card IC (Security Controller) SLE66CX162PE / m1531-a25 and SLE66CX80PE / m1533-a25 all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and both with specific IC dedicated software
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1136-V2-2022: 1
- BSI-DSZ-CC-1136-V3-2022: 3
- BSI-DSZ-CC-1136-V4-: 1
- BSI-DSZ-CC-1136-V4-2024: 22
|
- DE:
- BSI-DSZ-CC-0470-2008: 5
- BSI-DSZ-CC-0629: 1
- BSI-DSZ-CC-0629-2010: 21
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 5
- EAL 6 augmented: 3
|
- EAL:
- EAL 4: 5
- EAL 5: 4
- EAL 5 augmented: 3
- EAL1: 6
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ATE:
- AVA:
|
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 3
- ACM_SCP.3: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.2: 1
- ALC_TAT: 2
- ALC_TAT.2: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
- NXP:
- NXP: 126
- NXP Semiconductors: 42
|
- Infineon:
- Infineon: 10
- Infineon Technologies: 8
- Infineon Technologies AG: 13
- Philips:
|
| pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 4
|
- TUV:
- TÜV Informationstechnik: 4
|
| pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 11
- Triple-DES: 6
- DES:
- constructions:
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
- Generic:
- Crypto Library 0.7.6: 1
- Crypto Library 0.7.7: 1
- Crypto Library v0.7.6: 4
- Crypto Library v0.7.7: 3
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
- FI:
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 1
- side-channel: 1
- other:
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 1
- other:
|
| pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 2
- AIS 25: 2
- AIS 26: 1
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 2
- AIS 37: 2
- AIS 39: 1
- AIS 46: 1
- AIS 47: 1
- AIS20: 3
- AIS31: 1
- FIPS:
- FIPS 186-4: 2
- FIPS180-4: 3
- FIPS186-4: 5
- FIPS197: 15
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-90A: 1
- PKCS:
|
- BSI:
- AIS 20: 1
- AIS 25: 3
- AIS 26: 2
- AIS 31: 4
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- AIS31: 1
- FIPS:
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 2024, Version 2, 2024-02-20, Evaluation Technical Report Summary, TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- Evaluation Technical Report For Composite Evaluation (ETR Comp), TÜV Informationstechnik GmbH (confidential document) [11] SmartMX3 family N7121, Wafer and delivery specification, Version 3.3, 2021-08-27, NXP: 1
- N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report NXP Secure Smart Card Controller N7121 with IC Dedicated Software: 1
- NXP Semiconductors (confidential document) [13] NXP Secure Smart Card Controller N7121, Overview Product data sheet, Version 3.3, 2020-04-15: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- confidential document) [12] NXP Secure Smart Card Controller N7121, Information on Guidance and Operation, Version 3.2: 1
|
- ConfidentialDocument:
- V1.0, Version 3 from 2010-04-27, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [11] Application Note, SLE66CxxxP, DDES - EC2 Accelerator including complementary Application Note: 1
- V1.0, Version 3 from 2010-04-27, Evaluation Body for IT Security of TÜV Informationstechnik GmbH (confidential document) [8] Configuration Management Scope (ACM_SCP), SLE66CX162PE / m1531-a25, SLE66CX80PE / m1533-a25: 1
- optional libraries RSA V1.6 and EC V1.1 and SHA-2 V1.0 1.1 2010-01-21, Infineon Technologies AG (confidential document) [9] Smart card IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
|
| pdf_data/report_metadata |
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller"
- /Subject: Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller
- /Title: Certification Report BSI-DSZ-CC-1136-V4-2024
- pdf_file_size_bytes: 573114
- pdf_hyperlinks: https://www.sogis.eu/, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 39
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20100702113415+02'00'
- /Creator: Writer
- /Keywords: "Infineon Smart Card IC (Security Controller) SLE66CX162PE / m1531-a25 and SLE66CX80PE / m1533-a25 all with optional libraries RSA V1.6, EC V1.1, SHA-2 V1.0 and both with specific IC dedicated software, Infineon Technologies AG, Common Criteria, Certification, Zertifzierung"
- /ModDate: D:20100702131309+02'00'
- /Producer: OpenOffice.org 3.1
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0629-2010
- pdf_file_size_bytes: 870552
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
| pdf_data/st_filename |
1136V4b_pdf.pdf |
0629b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0266-2005: 1
- BSI-DSZ-CC-0470-2008: 2
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
- EAL6: 46
- EAL6 augmented: 3
|
- EAL:
- EAL 5: 4
- EAL 5 augmented: 4
- EAL5: 5
- EAL5 augmented: 2
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_CMC.4: 1
- ADV_CMC.5: 1
- ADV_CMS.4: 1
- ADV_CMS.5: 1
- ADV_FSP.4: 4
- ADV_FSP.5: 8
- ADV_IMP.1: 2
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 8
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMC.5: 2
- ALC_CMS: 1
- ALC_CMS.4: 3
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.2: 2
- ALC_FLR.1: 6
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 7
- ATE:
- ATE_COV.2: 2
- ATE_COV.3: 2
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 2
- ACM_SCP: 3
- ACM_SCP.2: 1
- ACM_SCP.3: 4
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 5
- ADV_HLD.3: 3
- ADV_IMP.2: 3
- ADV_INT.1: 3
- ADV_LLD.1: 3
- ADV_RCR.2: 3
- ADV_SPM.1: 3
- ADV_SPM.3: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS.2: 4
- ALC_LCD.2: 2
- ALC_TAT.2: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 2
- ATE_FUN.1: 1
- ATE_IND.2: 2
- AVA:
- AVA_CCA.1: 2
- AVA_MSU.3: 4
- AVA_SOF: 5
- AVA_SOF.1: 1
- AVA_VLA.4: 4
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1: 5
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 65
- FCS_CKM.1: 5
- FCS_CKM.2: 4
- FCS_CKM.4: 20
- FCS_CKM.5: 4
- FCS_CKM.5.1: 1
- FCS_COP: 45
- FCS_COP.1: 14
- FCS_RNG: 16
- FCS_RNG.1: 8
- FDP:
- FDP_ACC: 14
- FDP_ACC.1: 7
- FDP_ACF: 16
- FDP_ACF.1: 10
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_ITC.1: 19
- FDP_ITC.2: 19
- FDP_ITT.1: 7
- FDP_ITT.1.1: 1
- FDP_MSA: 4
- FDP_SDC.1: 4
- FDP_SDC.1.1: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 6
- FDP_UCT.1: 1
- FDP_UIT: 5
- FDP_UIT.1: 2
- FMT:
- FMT_LIM: 13
- FMT_LIM.1: 8
- FMT_LIM.1.1: 1
- FMT_LIM.2: 8
- FMT_LIM.2.1: 1
- FMT_MSA: 13
- FMT_MSA.1: 2
- FMT_MSA.3: 5
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT.2: 8
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 5
- FTP_TRP.1: 2
|
- FAU:
- FCS:
- FCS_CKM.1: 51
- FCS_CKM.1.1: 5
- FCS_CKM.2: 7
- FCS_CKM.4: 31
- FCS_CKM.4.1: 3
- FCS_COP.1: 53
- FCS_COP.1.1: 5
- FCS_RND: 2
- FCS_RND.1: 4
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 25
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_CKM.2: 1
- FDP_IFC.1: 14
- FDP_ITC.1: 25
- FDP_ITC.1.1: 3
- FDP_ITC.1.2: 3
- FDP_ITC.1.3: 3
- FDP_ITC.2: 24
- FDP_ITC.2.1: 3
- FDP_ITC.2.2: 3
- FDP_ITC.2.3: 3
- FDP_ITC.2.4: 3
- FDP_ITC.2.5: 3
- FDP_ITT.1: 3
- FDP_SDI.1: 17
- FDP_SDI.1.1: 1
- FDP_SDI.2: 15
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 4
- FMT_LIM.2: 4
- FMT_MSA.1: 15
- FMT_MSA.1.1: 1
- FMT_MSA.2: 33
- FMT_MSA.2.1: 3
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FPT:
- FPT_AMT.1: 4
- FPT_FLS.1: 6
- FPT_ITT.1: 3
- FPT_PHP.3: 7
- FPT_SEP.1: 6
- FPT_TDC.1: 3
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.2: 26
- FPT_TST.2.1: 2
- FRU:
- FTP:
- FTP_ITC.1: 3
- FTP_TRP.1: 3
|
| pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 4
- O.ECC: 4
- O.PUF: 4
- O.RND: 5
- O.RSA: 4
- O.SHA: 3
- O.TDES: 5
- T:
|
|
| pdf_data/st_keywords/vendor |
- NXP:
- NXP: 392
- NXP Semiconductors: 26
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 8
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 44
- AES-: 1
- AES-128: 2
- DES:
- 3DES:
- TDEA: 1
- TDES: 32
- Triple-DES: 8
- DES:
- constructions:
- MAC:
- CBC-MAC: 6
- CMAC: 5
- HMAC: 1
- miscellaneous:
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 4
- SHA-384: 4
- SHA-512: 4
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 48
- SHA-224: 1
- SHA-256: 2
- SHA-384: 1
- SHA-512: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
- ANSSI:
- Brainpool:
- brainpoolP224r1: 3
- brainpoolP224t1: 3
- brainpoolP256r1: 4
- brainpoolP256t1: 4
- brainpoolP320r1: 3
- brainpoolP320t1: 3
- brainpoolP384r1: 4
- brainpoolP384t1: 4
- brainpoolP512r1: 4
- brainpoolP512t1: 4
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
- Generic:
- Crypto Library 0.7.6: 4
- Crypto Library 0.7.7: 4
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 7
- fault injection: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 7
- Physical Probing: 2
- physical probing: 2
- side channel: 6
|
- FI:
- DFA: 4
- Malfunction: 15
- malfunction: 3
- SCA:
- DPA: 10
- Leak-Inherent: 10
- Physical Probing: 2
- SPA: 4
- other:
|
| pdf_data/st_keywords/technical_report_id |
- BSI:
- BSI TR-03110-1: 1
- BSI TR-03110-2: 1
- BSI TR-03110-3: 1
- BSI TR-03110-4: 1
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- BSI:
- AIS 26: 1
- AIS 31: 1
- AIS20: 2
- AIS26: 2
- AIS31: 3
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 180-4: 2
- FIPS 186-4: 4
- FIPS 197: 5
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- ISO:
- ISO/IEC 11770-3: 2
- ISO/IEC 14443: 2
- ISO/IEC 14888-3: 3
- ISO/IEC 7816: 6
- ISO/IEC 9797-1: 4
- NIST:
- NIST SP 800-38A: 6
- NIST SP 800-38B: 3
- NIST SP 800-67: 5
- PKCS:
- RFC:
|
- BSI:
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 2
- FIPS:
- FIPS 180-3: 1
- FIPS PUB 180-3: 1
- ISO:
- ISO/IEC 7816: 6
- ISO/IEC 7816-3: 1
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 192 – 512 bit key length Data encryption according to single-DES and 3DES standard (single DES is out of scope of the evaluation) Advanced security sensors and physical countermeasures (e.g. shielding: 1
- out of scope: 1
- single DES is out of scope of the evaluation: 1
|
| pdf_data/st_metadata |
- /Author: NXP B.V.
- /Keywords: Common Criteria, Security Target, Security IC, N7121
- /Subject: NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
- /Title: Security Target Lite
- pdf_file_size_bytes: 777912
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 84
|
- /Author: Infineon
- /CreationDate: D:20100128115525Z
- /Creator: Microsoft® Office Word 2007
- /Keywords: Public Security Target for Certification on level EAL5 augmented (EAL5+); CC EAL5+ Certification Security Target
- /ModDate: D:20100702131811+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: CC EAL5+ Certification Security Target
- /Title: Security Target
- pdf_file_size_bytes: 1017605
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |