Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HarmonyOS 3.0 on Huawei MatePad Pro
NSCIB-CC-0531255-CR
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
BSI-DSZ-CC-1136-V4-2024
name HarmonyOS 3.0 on Huawei MatePad Pro NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
category Mobility ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme NL DE
not_valid_after 19.12.2028 05.03.2029
not_valid_before 19.12.2023 05.03.2024
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cert.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-cr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-23-0531255-st_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V4b_pdf.pdf
manufacturer Huawei Device Co., Ltd. NXP Semiconductors Germany GmbH
manufacturer_web https://www.huawei.com/ https://www.nxp.com
security_level ALC_FLR.3, EAL2+ EAL6+, ASE_TSS.2, ALC_FLR.1
dgst c85f7e09316c6900 ba8d9fb5fd39868c
heuristics/cert_id NSCIB-CC-0531255-CR BSI-DSZ-CC-1136-V4-2024
heuristics/cert_lab BSI
heuristics/cpe_matches cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2023-52098, CVE-2023-46770, CVE-2023-39393, CVE-2024-45445, CVE-2025-58314, CVE-2023-39387, CVE-2023-41296, CVE-2022-41591, CVE-2022-48297, CVE-2024-47291, CVE-2024-27897, CVE-2025-54611, CVE-2024-54100, CVE-2023-52363, CVE-2022-48513, CVE-2023-52720, CVE-2023-52370, CVE-2023-37240, CVE-2022-48291, CVE-2024-45449, CVE-2023-39406, CVE-2023-39405, CVE-2023-52552, CVE-2022-48293, CVE-2025-54637, CVE-2022-48302, CVE-2024-42033, CVE-2023-52113, CVE-2023-52717, CVE-2023-39382, CVE-2024-42034, CVE-2023-52386, CVE-2024-39674, CVE-2023-39381, CVE-2024-45447, CVE-2023-46764, CVE-2023-46755, CVE-2024-54096, CVE-2024-47292, CVE-2024-36500, CVE-2024-30417, CVE-2023-46768, CVE-2023-52544, CVE-2022-44559, CVE-2023-44119, CVE-2023-52719, CVE-2024-36503, CVE-2023-49243, CVE-2023-39408, CVE-2023-52366, CVE-2024-42031, CVE-2023-44109, CVE-2024-30418, CVE-2023-52540, CVE-2023-41304, CVE-2022-48355, CVE-2023-37245, CVE-2022-44560, CVE-2023-26549, CVE-2023-52554, CVE-2022-48350, CVE-2022-44556, CVE-2023-52380, CVE-2022-48288, CVE-2023-52108, CVE-2023-52376, CVE-2023-49246, CVE-2023-39404, CVE-2023-49242, CVE-2023-52385, CVE-2023-52104, CVE-2023-52387, CVE-2022-48289, CVE-2022-48357, CVE-2023-39386, CVE-2023-52716, CVE-2022-48359, CVE-2024-54097, CVE-2023-44115, CVE-2022-48290, CVE-2022-48292, CVE-2023-52377, CVE-2023-52114, CVE-2022-48349, CVE-2023-39398, CVE-2023-26547, CVE-2022-48300, CVE-2023-39397, CVE-2023-44105, CVE-2023-46774, CVE-2024-32991, CVE-2025-54636, CVE-2024-42032, CVE-2023-46761, CVE-2023-1691, CVE-2023-52553, CVE-2022-41590, CVE-2025-66325, CVE-2024-39673, CVE-2023-52375, CVE-2024-45443, CVE-2024-42037, CVE-2024-32996, CVE-2022-48346, CVE-2024-36502, CVE-2022-48299, CVE-2023-46758, CVE-2022-48613, CVE-2023-44095, CVE-2023-37238, CVE-2025-48902, CVE-2023-52364, CVE-2024-47290, CVE-2022-44555, CVE-2023-44098, CVE-2024-56442, CVE-2024-45446, CVE-2023-52543, CVE-2023-44103, CVE-2023-52102, CVE-2025-58302, CVE-2023-7271, CVE-2024-45450, CVE-2023-44117, CVE-2023-39399, CVE-2023-52369, CVE-2023-44106, CVE-2022-44557, CVE-2023-34164, CVE-2023-52378, CVE-2024-56440, CVE-2023-52103, CVE-2023-41299, CVE-2023-44116, CVE-2023-41305, CVE-2023-44097, CVE-2023-5801, CVE-2023-1695, CVE-2023-46765, CVE-2023-52365, CVE-2023-44094, CVE-2023-52955, CVE-2024-32992, CVE-2022-48354, CVE-2023-52545, CVE-2022-48361, CVE-2023-52538, CVE-2023-52383, CVE-2024-51529, CVE-2024-45444, CVE-2022-48360, CVE-2024-51528, CVE-2023-44111, CVE-2023-41300, CVE-2023-44112, CVE-2024-54099, CVE-2023-39395, CVE-2023-41307, CVE-2023-39383, CVE-2023-52384, CVE-2023-52367, CVE-2024-32997, CVE-2023-49244, CVE-2023-4566, CVE-2023-41293, CVE-2023-41303, CVE-2023-41310, CVE-2025-31175, CVE-2023-52549, CVE-2024-32990, CVE-2023-52388, CVE-2023-52099, CVE-2023-52097, CVE-2024-30414, CVE-2024-30416, CVE-2024-51527, CVE-2023-46759, CVE-2022-48298, CVE-2022-48508, CVE-2023-1696, CVE-2023-46773, CVE-2023-39400, CVE-2024-54101, CVE-2023-44102, CVE-2023-52713, CVE-2023-52373, CVE-2023-1694, CVE-2022-44548, CVE-2023-49247, CVE-2023-41309, CVE-2023-6273, CVE-2023-44096, CVE-2023-52359, CVE-2023-52111, CVE-2024-32998, CVE-2023-41301, CVE-2022-48348, CVE-2023-44100, CVE-2023-44099, CVE-2023-49240, CVE-2023-52539, CVE-2023-52954, CVE-2023-52357, CVE-2024-58043, CVE-2023-3456, CVE-2023-49241, CVE-2023-46760, CVE-2024-56447, CVE-2023-37241, CVE-2023-4565, CVE-2023-41302, CVE-2025-53186, CVE-2024-56441, CVE-2023-39389, CVE-2023-3455, CVE-2024-57961, CVE-2023-49248, CVE-2024-27896, CVE-2023-39391, CVE-2023-46756, CVE-2023-41298, CVE-2023-52362, CVE-2023-39401, CVE-2023-44118, CVE-2023-52372, CVE-2023-46763, CVE-2023-46767, CVE-2023-52116, CVE-2024-47293, CVE-2024-56449, CVE-2025-54646, CVE-2023-52381, CVE-2025-54641, CVE-2024-32999, CVE-2023-44108, CVE-2023-52551, CVE-2025-58276, CVE-2023-39388, CVE-2023-46766, CVE-2023-49239, CVE-2023-52374, CVE-2023-52542, CVE-2023-41312, CVE-2023-41308, CVE-2024-36501, CVE-2022-48621, CVE-2023-46762, CVE-2023-1693, CVE-2023-52714, CVE-2024-56448, CVE-2022-48358, CVE-2023-52358, CVE-2022-48352, CVE-2023-37239, CVE-2023-39385, CVE-2023-52112, CVE-2023-44104, CVE-2023-41295, CVE-2022-48351, CVE-2022-44553, CVE-2022-48286, CVE-2023-52107, CVE-2021-46856, CVE-2023-46771, CVE-2023-46769, CVE-2024-51530, CVE-2025-66329, CVE-2023-41311, CVE-2022-48314, CVE-2023-52101, CVE-2024-36499, CVE-2023-39403, CVE-2023-39402, CVE-2023-39390, CVE-2023-7265, CVE-2023-52953, CVE-2024-42039, CVE-2023-37242, CVE-2022-44561, CVE-2023-52537, CVE-2023-39380, CVE-2023-52368, CVE-2022-44562, CVE-2024-32995, CVE-2022-48313, CVE-2022-48301, CVE-2022-48347, CVE-2023-44110, CVE-2023-44113, CVE-2023-52550, CVE-2023-39409, CVE-2025-54642, CVE-2022-48296, CVE-2022-48606, CVE-2023-1692, CVE-2023-52541, CVE-2023-39384, CVE-2024-54098, CVE-2024-42036, CVE-2023-49245, CVE-2023-44093, CVE-2024-42038, CVE-2023-39392, CVE-2023-26548, CVE-2024-32993, CVE-2024-39670, CVE-2023-39394, CVE-2023-52109, CVE-2023-39396, CVE-2024-57960, CVE-2023-52379, CVE-2023-44114, CVE-2024-30415, CVE-2024-45441, CVE-2024-47294 {}
heuristics/extracted_sars AGD_OPE.1, ALC_FLR.3 ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ASE_REQ.2, ADV_CMS.5, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, ALC_TAT.3, ALC_LCD.1, ADV_CMC.5, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ASE_TSS.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ADV_SPM.1, ADV_ARC.1
heuristics/extracted_versions 3.0 -
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2021/18-R01, ANSSI-CC-2025/02, NSCIB-CC-2300154-01-CR, ANSSI-CC-2020/10-R01, NSCIB-CC-2300155-01-CR, ANSSI-CC-2021/20-R01, NSCIB-CC-2300156-01-CR, ANSSI-CC-2025/01, ANSSI-CC-2020/72-R01, ANSSI-CC-2020/73-R01, NSCIB-CC-2300157-01-CR, NSCIB-CC-2300172-01-CR, ANSSI-CC-2021/19-R01
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-1136-V3-2022
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2021/18-R01, ANSSI-CC-2025/02, NSCIB-CC-2300154-01-CR, ANSSI-CC-2020/10-R01, NSCIB-CC-2300155-01-CR, ANSSI-CC-2021/20-R01, NSCIB-CC-2300156-01-CR, NSCIB-CC-2400004-01-CR, ANSSI-CC-2025/01, ANSSI-CC-2020/72-R01, ANSSI-CC-2020/73-R01, NSCIB-CC-2300157-01-CR, NSCIB-CC-2300172-01-CR, ANSSI-CC-2021/19-R01
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-1136-2021
heuristics/scheme_data
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2021/18-R01, ANSSI-CC-2025/02, NSCIB-CC-2300154-01-CR, ANSSI-CC-2020/10-R01, NSCIB-CC-2300155-01-CR, ANSSI-CC-2021/20-R01, NSCIB-CC-2300156-01-CR, ANSSI-CC-2025/01, ANSSI-CC-2020/72-R01, ANSSI-CC-2020/73-R01, NSCIB-CC-2300157-01-CR, NSCIB-CC-2300172-01-CR, ANSSI-CC-2021/19-R01
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2021/18-R01, ANSSI-CC-2025/02, NSCIB-CC-2300154-01-CR, ANSSI-CC-2020/10-R01, NSCIB-CC-2300155-01-CR, ANSSI-CC-2021/20-R01, NSCIB-CC-2300156-01-CR, NSCIB-CC-2400004-01-CR, ANSSI-CC-2025/01, ANSSI-CC-2020/72-R01, ANSSI-CC-2020/73-R01, NSCIB-CC-2300157-01-CR, NSCIB-CC-2300172-01-CR, ANSSI-CC-2021/19-R01
heuristics/protection_profiles {} cf0f01bcd7be3e9c
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename nscib-cc-23-0531255-cert.pdf 1136V4c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-23-0531255: 1
  • DE:
    • BSI-DSZ-CC-1136-V4-2024: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL 2: 1
    • EAL 5: 1
    • EAL 6: 1
    • EAL 6 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 3
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
  • ASE:
    • ASE_TSS.2: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.C: 1
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 2
    • Huawei Technologies Co: 1
  • NXP:
    • NXP: 1
    • NXP Semiconductors: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /Author: kruitr
  • /CreationDate: D:20231220084522+01'00'
  • /Creator: Bullzip PDF Printer (11.10.0.2761)
  • /ModDate: D:20231220084546+01'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-23-0531255-Cert.docx
  • pdf_file_size_bytes: 286124
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Federal Office for Information Security
  • /Keywords: "Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller"
  • /Subject: Common Criteria, Certification, Zertifizierung, NXP, N7121, Smat Card Controller
  • /Title: Certificate BSI-DSZ-CC-1136-V4-2024
  • pdf_file_size_bytes: 235369
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename nscib-cc-23-0531255-cr.pdf 1136V4a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • NL:
    • cert_id: NSCIB-CC-0531255-CR
    • cert_item: HarmonyOS 3.0 on Huawei MatePad Pro
    • cert_lab: SGS Brightsight B.V.
    • developer: Huawei Device Co.,Ltd
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1 valid until: 04 March 2029
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1136-V4-2024
    • cert_item: NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
  • NL:
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-0531255-CR: 11
  • DE:
    • BSI-DSZ-CC-1136-V2-2022: 1
    • BSI-DSZ-CC-1136-V3-2022: 3
    • BSI-DSZ-CC-1136-V4-: 1
    • BSI-DSZ-CC-1136-V4-2024: 22
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 2
    • EAL4: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 4: 1
    • EAL 5: 4
    • EAL 5+: 1
    • EAL 6: 5
    • EAL 6 augmented: 3
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE_PRE: 1
  • ALC:
    • ALC_FLR.3: 2
  • ALC:
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_TSS.2: 4
  • ATE:
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP: 1
pdf_data/report_keywords/cc_claims
  • R:
    • R.C: 3
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 18
    • Huawei Technologies Co: 1
  • NXP:
    • NXP: 126
    • NXP Semiconductors: 42
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 31
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 11
      • Triple-DES: 6
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CBC-MAC: 6
      • CMAC: 11
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 18
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 8
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 11
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 8
  • CTR:
    • CTR: 6
  • ECB:
    • ECB: 4
  • OFB:
    • OFB: 4
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX3: 4
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library 0.7.6: 1
    • Crypto Library 0.7.7: 1
    • Crypto Library v0.7.6: 4
    • Crypto Library v0.7.7: 3
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
  • FI:
    • fault injection: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 1
    • side-channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 1
    • iTrustee: 3
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 1
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 2
    • AIS 37: 2
    • AIS 39: 1
    • AIS 46: 1
    • AIS 47: 1
    • AIS20: 3
    • AIS31: 1
  • FIPS:
    • FIPS 186-4: 2
    • FIPS180-4: 3
    • FIPS186-4: 5
    • FIPS197: 15
  • ISO:
    • ISO/IEC 14888-3: 1
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • NIST:
    • NIST SP 800-108: 1
    • NIST SP 800-90A: 1
  • PKCS:
    • PKCS #1: 10
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 2024, Version 2, 2024-02-20, Evaluation Technical Report Summary, TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • Evaluation Technical Report For Composite Evaluation (ETR Comp), TÜV Informationstechnik GmbH (confidential document) [11] SmartMX3 family N7121, Wafer and delivery specification, Version 3.3, 2021-08-27, NXP: 1
    • N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report NXP Secure Smart Card Controller N7121 with IC Dedicated Software: 1
    • NXP Semiconductors (confidential document) [13] NXP Secure Smart Card Controller N7121, Overview Product data sheet, Version 3.3, 2020-04-15: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • confidential document) [12] NXP Secure Smart Card Controller N7121, Information on Guidance and Operation, Version 3.2: 1
pdf_data/report_metadata
pdf_data/st_filename nscib-cc-23-0531255-st_v1.0.pdf 1136V4b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1136: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-2014: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 1
  • EAL:
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL6: 46
    • EAL6 augmented: 3
pdf_data/st_keywords/cc_sar
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_OPE_PRE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.3: 4
  • ADV:
    • ADV_ARC.1: 2
    • ADV_CMC.4: 1
    • ADV_CMC.5: 1
    • ADV_CMS.4: 1
    • ADV_CMS.5: 1
    • ADV_FSP.4: 4
    • ADV_FSP.5: 8
    • ADV_IMP.1: 2
    • ADV_IMP.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 8
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMC.5: 2
    • ALC_CMS: 1
    • ALC_CMS.4: 3
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.2: 2
    • ALC_FLR.1: 6
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 7
  • ATE:
    • ATE_COV.2: 2
    • ATE_COV.3: 2
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKH: 12
    • FCS_CKH.1: 12
    • FCS_CKH.1.1: 2
    • FCS_CKH.1.2: 2
    • FCS_CKH.1.3: 2
    • FCS_CKM.1: 6
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 14
    • FCS_COP.1: 6
    • FCS_RNG: 4
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 7
    • FDP_ACF: 20
    • FDP_ACF.1: 15
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL: 5
    • FIA_AFL.1: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 3
    • FIA_SOS.1.1: 1
    • FIA_UAU: 5
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 3
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 4
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 21
    • FMT_MSA.1: 4
    • FMT_MSA.3: 7
    • FMT_SMF: 23
    • FMT_SMF.1: 6
    • FMT_SMR.1: 7
  • FPR:
    • FPR_PSE: 10
    • FPR_PSE.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 2
    • FPT_RCV: 1
    • FPT_RCV.2: 5
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 16
    • FTP_ITC.1: 9
  • FAU:
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 65
    • FCS_CKM.1: 5
    • FCS_CKM.2: 4
    • FCS_CKM.4: 20
    • FCS_CKM.5: 4
    • FCS_CKM.5.1: 1
    • FCS_COP: 45
    • FCS_COP.1: 14
    • FCS_RNG: 16
    • FCS_RNG.1: 8
  • FDP:
    • FDP_ACC: 14
    • FDP_ACC.1: 7
    • FDP_ACF: 16
    • FDP_ACF.1: 10
    • FDP_IFC.1: 11
    • FDP_IFC.1.1: 1
    • FDP_ITC.1: 19
    • FDP_ITC.2: 19
    • FDP_ITT.1: 7
    • FDP_ITT.1.1: 1
    • FDP_MSA: 4
    • FDP_SDC.1: 4
    • FDP_SDC.1.1: 1
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT: 6
    • FDP_UCT.1: 1
    • FDP_UIT: 5
    • FDP_UIT.1: 2
  • FMT:
    • FMT_LIM: 13
    • FMT_LIM.1: 8
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 8
    • FMT_LIM.2.1: 1
    • FMT_MSA: 13
    • FMT_MSA.1: 2
    • FMT_MSA.3: 5
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 7
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 8
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 8
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC: 6
    • FTP_ITC.1: 5
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.APP_DISTRIBUTION_PLATFORM: 2
    • A.PASSWORD_PIN_PATTERN: 2
  • O:
    • O.ACCESS_CONTROL: 3
    • O.AUTHENTICATED_UPDATES: 3
    • O.AUTHENTICATE_PEER_DEVICE: 3
    • O.AUTHENTICATE_USER: 3
    • O.CRITICAL_STORAGE: 4
    • O.CRYPTOGRAPHY: 6
    • O.DATA_CLASSIFICATION: 2
    • O.PERSISTENT: 2
    • O.PROTECT_ASSETS_AT_REST: 3
    • O.PROTECT_COMMS: 5
    • O.RANDOMS: 4
    • O.SECURE_BOOT: 6
    • O.SECURE_WIPE: 3
    • O.SELF_PROTECTION: 2
    • O.SEPARATION: 3
  • OE:
    • OE.APP_DISTRIBUTION_PLATFORM: 2
    • OE.PASSWORD_PIN_PATTERN: 2
  • T:
    • T.COUNTERFEIT_DEVICE: 2
    • T.EAVESDROP: 3
    • T.FLAWAPP: 3
    • T.IMPERSONATE: 3
    • T.MODIFY-COMMS: 3
    • T.MODIFY_DEVICE: 3
    • T.PERSISTENT: 3
    • T.PHYSICAL: 3
    • T.RECOVER_DATA: 3
    • T.SPOOF: 3
  • O:
    • O.AES: 4
    • O.ECC: 4
    • O.PUF: 4
    • O.RND: 5
    • O.RSA: 4
    • O.SHA: 3
    • O.TDES: 5
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 27
    • Huawei Technologies Co: 58
  • NXP:
    • NXP: 392
    • NXP Semiconductors: 26
pdf_data/st_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 2
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 44
      • AES-: 1
      • AES-128: 2
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 32
      • Triple-DES: 8
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • CBC-MAC: 6
      • CMAC: 5
      • HMAC: 1
  • miscellaneous:
    • SEED:
      • SEED: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 3
  • RSA:
    • RSA-2048: 1
  • ECC:
    • ECC:
      • ECC: 50
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 12
  • FF:
    • DH:
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 3
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 4
      • SHA-256: 4
      • SHA-384: 4
      • SHA-512: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • PAKE:
    • PAKE: 1
  • KA:
    • Key Agreement: 1
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 16
      • TLS 1.2: 1
      • TLS v1.2: 4
  • PACE:
    • PACE: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
    • PRNG: 1
  • RNG:
    • RNG: 1
  • RNG:
    • RND: 7
    • RNG: 33
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 1
  • CBC:
    • CBC: 6
  • CTR:
    • CTR: 2
  • ECB:
    • ECB: 6
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
  • ANSSI:
    • ANSSI FRP256v1: 3
  • Brainpool:
    • brainpoolP224r1: 3
    • brainpoolP224t1: 3
    • brainpoolP256r1: 4
    • brainpoolP256t1: 4
    • brainpoolP320r1: 3
    • brainpoolP320t1: 3
    • brainpoolP384r1: 4
    • brainpoolP384t1: 4
    • brainpoolP512r1: 4
    • brainpoolP512t1: 4
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX3: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
  • Generic:
    • Crypto Library 0.7.6: 4
    • Crypto Library 0.7.7: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 7
    • fault injection: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 7
    • Physical Probing: 2
    • physical probing: 2
    • side channel: 6
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110-1: 1
    • BSI TR-03110-2: 1
    • BSI TR-03110-3: 1
    • BSI TR-03110-4: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • TrustZone: 2
  • other:
    • TEE: 15
    • iTrustee: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-01: 1
    • CCMB-2017-04-02: 1
    • CCMB-2017-04-03: 1
    • CCMB-2017-04-04: 1
  • FIPS:
    • FIPS PUB 186-4: 1
  • NIST:
    • NIST SP 800-38E: 1
    • NIST SP 800-90A: 1
    • SP 800-108: 4
    • SP 800-132: 1
  • RFC:
    • RFC 2818: 3
    • RFC 5246: 1
    • RFC 5280: 3
    • RFC 5289: 6
    • RFC5289: 2
  • X509:
    • X.509: 1
  • BSI:
    • AIS 26: 1
    • AIS 31: 1
    • AIS20: 2
    • AIS26: 2
    • AIS31: 3
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 180-4: 2
    • FIPS 186-4: 4
    • FIPS 197: 5
    • FIPS PUB 180-4: 1
    • FIPS PUB 186-4: 1
  • ISO:
    • ISO/IEC 11770-3: 2
    • ISO/IEC 14443: 2
    • ISO/IEC 14888-3: 3
    • ISO/IEC 7816: 6
    • ISO/IEC 9797-1: 4
  • NIST:
    • NIST SP 800-38A: 6
    • NIST SP 800-38B: 3
    • NIST SP 800-67: 5
  • PKCS:
    • PKCS #1: 2
  • RFC:
    • RFC 5639: 9
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • out of the scope of the TOE. Any data on these devices or services associated with these devices is out of scope of the TOE. The operating system of the TOE controls and manages the hardware and the apps (both: 1
pdf_data/st_metadata
  • /Author: NXP B.V.
  • /Keywords: Common Criteria, Security Target, Security IC, N7121
  • /Subject: NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 777912
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 84
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different