name |
Siemens RUGGEDCOM ROS v4.2.2.F running on the M969F, RS900F, RS900GF, RS900GPF, RS940GF, M2100F, RSG2100F, RSG2100PF, M2200F, RSG2200F, RSG2300F, RSG2300PF, RS400F, RS416F, RS416PF, RSG2488F switches |
NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
DE |
status |
archived |
active |
not_valid_after |
21.08.2020 |
09.02.2026 |
not_valid_before |
21.08.2018 |
07.06.2022 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-ci.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10877-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1136V2b_pdf.pdf |
manufacturer |
Siemens Canada Ltd. |
NXP Semiconductors Germany GmbH |
manufacturer_web |
https://www.siemens.com |
https://www.nxp.com |
security_level |
{} |
EAL6+, ASE_TSS.2, ALC_FLR.1 |
dgst |
d832f21299727366 |
4d33352dff9e40fc |
heuristics/cert_id |
CCEVS-VR-VID-10877-2018 |
BSI-DSZ-CC-1136-V2-2022 |
heuristics/cert_lab |
US |
BSI |
heuristics/cpe_matches |
cpe:2.3:h:siemens:ruggedcom_rsg2100f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900gf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2488f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs416pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900gpf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m2200f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2300f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2300pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m969f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs900f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs400f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2100pf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rsg2200f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_m2100f:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs940gf:-:*:*:*:*:*:*:*, cpe:2.3:h:siemens:ruggedcom_rs416f:-:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ADV_CMS.5, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_CMC.5, ASE_OBJ.2, ADV_IMP.2, ADV_ARC.1, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
4.2.2 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1119-2023, ANSSI-CC-2021/19v2, ANSSI-CC-2021/20v2, BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-1136-V4-2024, ANSSI-CC-2021/18v2, NSCIB-CC-180212-CR5 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1148-V3-2023, NSCIB-CC-2300154-01-CR, BSI-DSZ-CC-1221-2024, OCSI/CERT/CCL/09/2022/RC, ANSSI-CC-2021/19v2, ANSSI-CC-2021/20v2, BSI-DSZ-CC-1136-V3-2022, OCSI/CERT/CCL/10/2022/RC, BSI-DSZ-CC-1211-2023, ANSSI-CC-2021/18v2, NSCIB-CC-0237694-CR2, NSCIB-CC-2300155-01-CR, OCSI/CERT/CCL/08/2022/RC, BSI-DSZ-CC-1119-2023, NSCIB-CC-2400004-01-CR, ANSSI-CC-2020/73-R01, NSCIB-CC-0237686-CR2, ANSSI-CC-2021/20-R01, ANSSI-CC-2021/19-R01, NSCIB-CC-2300016-01-CR, BSI-DSZ-CC-1147-V2-2023, BSI-DSZ-CC-1147-V3-2023, NSCIB-CC-0490187-CR, BSI-DSZ-CC-1170-2023, NSCIB-CC-2200045-01-CR, NSCIB-CC-2300157-01-CR, NSCIB-CC-0095534-CR3, NSCIB-CC-0490185-CR, BSI-DSZ-CC-1136-V4-2024, NSCIB-CC-2200047-01-CR, ANSSI-CC-2025/02, NSCIB-CC-0490186-CR, NSCIB-CC-2300156-01-CR, NSCIB-CC-180212-CR5, ANSSI-CC-2021/18-R01, BSI-DSZ-CC-1148-V2-2023, ANSSI-CC-2020/72-R01, OCSI/CERT/CCL/11/2022/RC, ANSSI-CC-2025/01, ANSSI-CC-2020/10-R01, NSCIB-CC-2300172-01-CR, ANSSI-CC-2025/03, NSCIB-CC-0075446-CR2, NSCIB-CC-0237695-CR2 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-2021 |
heuristics/scheme_data |
- category: Network Device
- certification_date: 21.08.2018
- evaluation_facility: COACT, Inc. Labs
- expiration_date: 21.08.2020
- id: CCEVS-VR-VID10877
- product: Siemens RUGGEDCOM ROS v4.2.2.F running on the M969F, RS900F, RS900GF, RS900GPF, RS940GF, M2100F, RSG2100F, RSG2100PF, M2200F, RSG2200F, RSG2300F, RSG2300PF, RS400F, RS416F, RS416PF, RSG2488F switches
- scheme: US
- url: https://www.niap-ccevs.org/product/10877
- vendor: Siemens Canada Ltd.
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1119-2023, BSI-DSZ-CC-1170-2023, ANSSI-CC-2021/19v2, ANSSI-CC-2020/73-R01, ANSSI-CC-2020/72-R01, ANSSI-CC-2021/20-R01, ANSSI-CC-2021/20v2, ANSSI-CC-2020/10-R01, ANSSI-CC-2025/03, ANSSI-CC-2021/18v2 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1119-2023, BSI-DSZ-CC-1170-2023, ANSSI-CC-2021/19v2, ANSSI-CC-2020/73-R01, ANSSI-CC-2020/72-R01, ANSSI-CC-2021/20-R01, ANSSI-CC-2021/20v2, ANSSI-CC-2020/10-R01, ANSSI-CC-2025/03, ANSSI-CC-2021/18v2 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
48ac4778e4272298 |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.0E.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
st_vid10877-ci.pdf |
1136V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10877-2018: 1
|
- DE:
- BSI-DSZ-CC-1136-V2-2022: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 1
- EAL 6: 1
- EAL 6 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
- NXP:
- NXP: 1
- NXP Semiconductors: 1
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180823111041-04'00'
- /ModDate: D:20180823111041-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 183909
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220614102112+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, NXP, N7121"
- /ModDate: D:20220614102225+02'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria Certification
- /Title: Certificate BSI-DSZ-CC-1136-V2-2022
- pdf_file_size_bytes: 257737
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
st_vid10877-vr.pdf |
1136V2a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- US:
- cert_id: CCEVS-VR-VID10877-2018
- cert_item: Siemens Canada Ltd. RUGGEDCOM Rugged Operating System (ROS) V4.2.2.F Running on the M2100F, M2200F, M969F, RSG2100F, RSG2100PF, RSG2200F, RSG2300F, RSG2300PF, RSG2488F, RS400F, RS416F, RS416PF, RS900F, RS900GF, RS900GPF, and RS940GF RUGGEDCOM switches
- cert_lab: US NIAP
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1136-V2-2022
- cert_item: NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
- US:
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10877-2018: 1
|
- DE:
- BSI-DSZ-CC-1136-2021: 8
- BSI-DSZ-CC-1136-V2-: 1
- BSI-DSZ-CC-1136-V2-2022: 24
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 1
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 5
- EAL 6 augmented: 3
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 103
- NXP Semiconductors: 43
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 1
- TDES: 11
- Triple-DES: 6
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- Generic:
- Crypto Library 0.7.6: 1
- Crypto Library 24: 1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 2
- SPA: 1
- side-channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 20: 2
- AIS 25: 2
- AIS 26: 1
- AIS 31: 3
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 37: 2
- AIS 39: 1
- AIS 46: 1
- AIS 47: 1
- AIS20: 3
- AIS31: 2
- FIPS:
- FIPS 186-4: 1
- FIPS180-4: 3
- FIPS186-4: 3
- FIPS197: 15
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-90A: 1
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Evaluation Technical Report For Composite Evaluation (ETR Comp), TÜV Informationstechnik GmbH (confidential document) 10 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
- N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3) Security Target, NXP Semiconductors (confidential document) [7] Evaluation Technical Report NXP Secure Smart Card Controller N7121 with IC Dedicated Software: 1
- NXP Semiconductors (confidential document) [13] NXP Secure Smart Card Controller N7121, Overview Product data sheet, Version 3.3, 2020-04-15: 1
- Version 2, 2022-05-05, Evaluation Technical Report Summary, TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- family N7121, Wafer and delivery specification, Version 3.3, 2021-08-27, NXP Semiconductors (confidential document) [12] NXP Secure Smart Card Controller N7121, Information on Guidance and Operation, Version 3.2: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20180822131120-04'00'
- /ModDate: D:20180822131120-04'00'
- pdf_file_size_bytes: 690785
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220614100801+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, NXP, N7121"
- /ModDate: D:20220614104850+02'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-1136-V2-2022
- pdf_file_size_bytes: 1327051
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
st_vid10877-st.pdf |
1136V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
- EAL6: 46
- EAL6 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_CMC.4: 1
- ADV_CMC.5: 1
- ADV_CMS.4: 1
- ADV_CMS.5: 1
- ADV_FSP.4: 4
- ADV_FSP.5: 8
- ADV_IMP.1: 2
- ADV_IMP.2: 1
- ADV_INT.3: 1
- ADV_SPM.1: 8
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMC.5: 2
- ALC_CMS: 1
- ALC_CMS.4: 3
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.2: 2
- ALC_FLR.1: 6
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 7
- ATE:
- ATE_COV.2: 2
- ATE_COV.3: 2
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 15
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_STG.1: 1
- FAU_STG_EXT.1: 13
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 2
- FCS:
- FCS_CKM.1: 35
- FCS_CKM.1.1: 1
- FCS_CKM.2: 16
- FCS_CKM.2.1: 1
- FCS_CKM.4: 21
- FCS_CKM.4.1: 1
- FCS_COP: 65
- FCS_COP.1: 13
- FCS_RBG_EXT.1: 19
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 2
- FCS_SSHS_EXT.1: 20
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 2
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSS_EXT: 3
- FCS_TLSS_EXT.1: 15
- FCS_TLSS_EXT.1.1: 2
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLS_EXT.1: 2
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT.1: 13
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 3
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 13
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT.1: 19
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FIA_UID.1: 4
- FMT:
- FMT_MOF: 8
- FMT_MOF.1: 1
- FMT_MTD: 9
- FMT_MTD.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 4
- FMT_SMR.2: 10
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 13
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_ITT.1: 2
- FPT_PTD: 1
- FPT_SKP_EXT.1: 12
- FPT_SKP_EXT.1.1: 2
- FPT_SSP.1: 1
- FPT_STM.1: 3
- FPT_STM_EXT.1: 15
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 2
- FPT_TST: 1
- FPT_TST_EXT.1: 12
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT.1: 14
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTA_SSL.4: 8
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 12
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 15
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 17
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 10
- FTP_TRP.1: 3
|
- FAU:
- FAU_SAS.1: 5
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 65
- FCS_CKM.1: 5
- FCS_CKM.2: 4
- FCS_CKM.4: 20
- FCS_CKM.5: 4
- FCS_CKM.5.1: 1
- FCS_COP: 46
- FCS_COP.1: 14
- FCS_RNG: 16
- FCS_RNG.1: 8
- FDP:
- FDP_ACC: 14
- FDP_ACC.1: 7
- FDP_ACF: 16
- FDP_ACF.1: 10
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_ITC.1: 19
- FDP_ITC.2: 19
- FDP_ITT.1: 7
- FDP_ITT.1.1: 1
- FDP_MSA: 4
- FDP_SDC.1: 4
- FDP_SDC.1.1: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 6
- FDP_UCT.1: 1
- FDP_UIT: 5
- FDP_UIT.1: 2
- FMT:
- FMT_LIM: 13
- FMT_LIM.1: 8
- FMT_LIM.1.1: 1
- FMT_LIM.2: 8
- FMT_LIM.2.1: 1
- FMT_MSA: 13
- FMT_MSA.1: 2
- FMT_MSA.3: 5
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT.2: 8
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC: 6
- FTP_ITC.1: 5
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- OE:
- OE.ADMIN_CREDENTIALS_SECURE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROTECTION: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFORMATION: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
|
- O:
- O.AES: 4
- O.ECC: 4
- O.PUF: 4
- O.RND: 5
- O.RSA: 4
- O.SHA: 3
- O.TDES: 5
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 363
- NXP Semiconductors: 26
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
- MAC:
- HMAC: 11
- HMAC-SHA-256: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
|
- AES_competition:
- AES:
- AES: 44
- AES-: 1
- AES-128: 2
- DES:
- 3DES:
- TDEA: 1
- TDES: 32
- Triple-DES: 8
- DES:
- constructions:
- MAC:
- CBC-MAC: 6
- CMAC: 5
- HMAC: 1
- miscellaneous:
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 5
- DHE: 1
- Diffie-Hellman: 13
- RSA:
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 14
- SHA-384: 11
- SHA-512: 13
- SHA256: 3
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 4
- SHA-384: 4
- SHA-512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- DTLS:
- SSL:
- SSL: 6
- SSL 2.0: 2
- SSL 3.0: 2
- TLS:
- TLS: 51
- TLS 1.0: 2
- TLS 1.1: 3
- TLS 1.2: 3
- TLS v1.0: 1
- TLS v1.1: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 10
- P-384: 10
- P-521: 12
- secp256r1: 3
- secp384r1: 3
- secp521r1: 3
|
- ANSSI:
- Brainpool:
- brainpoolP224r1: 3
- brainpoolP224t1: 3
- brainpoolP256r1: 4
- brainpoolP256t1: 4
- brainpoolP320r1: 3
- brainpoolP320t1: 3
- brainpoolP384r1: 4
- brainpoolP384t1: 4
- brainpoolP512r1: 4
- brainpoolP512t1: 4
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 7
- fault injection: 1
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 7
- Physical Probing: 2
- physical probing: 2
- side channel: 6
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03110-1: 1
- BSI TR-03110-2: 1
- BSI TR-03110-3: 1
- BSI TR-03110-4: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 2
- FIPS 197: 2
- FIPS 198-1: 1
- FIPS PUB 186-4: 3
- ISO:
- ISO/IEC 18031:2011: 4
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- NIST SP 800-90A: 1
- SP 800-135: 1
- SP 800-52: 1
- SP 800-56A: 2
- SP 800-56B: 1
- SP 800-57: 1
- PKCS:
- RFC:
- RFC 2818: 3
- RFC 2986: 2
- RFC 3268: 4
- RFC 3526: 3
- RFC 4253: 2
- RFC 4346: 2
- RFC 4492: 2
- RFC 5246: 6
- RFC 5280: 5
- RFC 5289: 2
- RFC 5759: 1
- RFC 6069: 1
- RFC 6960: 1
- RFC24: 1
- X509:
|
- BSI:
- AIS 26: 1
- AIS 31: 1
- AIS20: 2
- AIS26: 2
- AIS31: 3
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 180-4: 2
- FIPS 186-4: 4
- FIPS 197: 5
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- ISO:
- ISO/IEC 11770-3: 2
- ISO/IEC 14443: 2
- ISO/IEC 14888-3: 3
- ISO/IEC 7816: 6
- ISO/IEC 9797-1: 4
- NIST:
- NIST SP 800-38A: 6
- NIST SP 800-38B: 3
- NIST SP 800-67: 5
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Siemens Canada Ltd
- /CreationDate: D:20180814122918-04'00'
- /Creator: DocBook XSL Stylesheets with Apache FOP
- /ModDate: D:20180822130851-04'00'
- /PDFVersion: 1.4
- /Producer: Apache FOP Version 1.0
- /Title: v4.2.2.F
- pdf_file_size_bytes: 468220
- pdf_hyperlinks: http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.html#3336, http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsanewval.html#2078, http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html#2631, http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#4037, http://csrc.nist.gov/groups/STM/cavp/documents/mac/hmacval.html#2635, http://csrc.nist.gov/groups/STM/cavp/documents/shs/shaval.html#3329, http://csrc.nist.gov/groups/STM/cavp/documents/dss/rsanewval.html#2072, http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsanewval.html#903, http://csrc.nist.gov/groups/STM/cavp/documents/components/componentnewval.html#858, http://csrc.nist.gov/groups/STM/cavp/documents/dss/ecdsanewval.html#899, mailto:[email protected], https://support.automation.siemens.com, https://www.siemens.com/ruggedcom, http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgnewval.html#1207, http://csrc.nist.gov/groups/STM/cavp/documents/components/componentnewval.html#863, http://csrc.nist.gov/groups/STM/cavp/documents/aes/aesval.html#4030, http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgnewval.html#1204, https://www.siemens.com/industrialsecurity
- pdf_is_encrypted: False
- pdf_number_of_pages: 92
|
- /Author: NXP B.V.
- /CreationDate: D:20220504144659+02'00'
- /Creator: DITA Open Toolkit 3.3.1
- /Keywords: Common Criteria, Security Target, Security IC, N7121
- /Producer: Apache FOP Version 2.3
- /Subject: NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3)
- /Title: Security Target Lite
- pdf_file_size_bytes: 760990
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 82
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |