This page was not yet optimized for use on mobile
devices.
NXP SmartePP Classic on P71 version 03 00 00 10
CSV information
| Status | active |
|---|---|
| Valid from | 12.05.2021 |
| Valid until | 12.05.2026 |
| Scheme | 🇳🇱 NL |
| Manufacturer | NXP Semiconductors Germany GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4+, ALC_FLR.1, ALC_DVS.2 |
| Protection profiles | |
| Maintenance updates | Assurance Continuity Maintenance Report (12.10.2022) Certification report Security target |
Heuristics summary
Certificate ID: NSCIB-CC-0108259-CR
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Vendor
NXP Semiconductors, NXPSecurity level
EAL2, EAL4, EAL4 augmentedClaims
R.LSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1Protection profiles
BSI-CC-PP-0055-Certificates
CC-21-0108259Evaluation facilities
RiscureStandards
ISO/IEC 15408-1, ISO/IEC 15408-2, ISO/IEC 15408-3, ISO/IEC 18045Certification report
Extracted keywords
Protocols
PACELibraries
Crypto Library 0.7.6Vendor
NXP, NXP SemiconductorsSecurity level
EAL4, EAL4+, EAL 4, EAL4 augmented, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1Protection profiles
BSI-CC-PP-0055-2009Certificates
BSI-DSZ-CC-1136-2021, NSCIB-CC-0108259-CREvaluation facilities
RiscureSide-channel analysis
JIL-AM, JIL-AAPS, JIL, JHASStandards
ICAOFile metadata
| Creation date | D:20210512105237+02'00' |
|---|---|
| Modification date | D:20210512105237+02'00' |
| Pages | 11 |
| Producer | Foxit Reader PDF Printer Version 7.1.0.112 |
Frontpage
| Certificate ID | NSCIB-CC-0108259-CR |
|---|---|
| Certified item | NXP SmartePP on P71, version 03 00 00 10 |
| Certification lab | Riscure B.V |
| Developer | NXP Semiconductors Germany GmbH |
References
Outgoing- BSI-DSZ-CC-1136-2021 - archived - NXP Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2)
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDES, KMACAsymmetric Algorithms
RSA 1024, ECDSA, ECCHash functions
SHA-1, SHA-224, SHA-256Schemes
MACRandomness
RNGBlock cipher modes
ECB, CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG15, EF.COM, EF.SODTrusted Execution Environments
SSCVendor
NXP, NXP SemiconductorsSecurity level
EAL 4+, EAL 6+, EAL 4, EAL4, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ASE_TSS.2Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_CKM.4.1, FCS_RND.1, FCS_RNG, FCS_CKM.1, FCS_CKM.4, FCS_COP, FCS_COP.1, FCS_RND.1.1, FCS_CKM, FDP_UIT.1, FDP_ITC.1, FDP_ITC.2, FDP_ITC, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FDP_ACF.1.2, FDP_ACF.1.4, FIA_API, FIA_API.1, FIA_API.1.1, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_ACC.1, FIA_ACF.1, FIA_UCT.1, FIA_AFL.1, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FMT_MTD.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3Protection profiles
BSI-CC-PP-0055-2009, BSI-CC-PP-0055, BSI-CC-PP0035-2007, BSI-CC-PP0055, BSI-CC-PP0056, BSI-PP-CC-0055, BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-1136-2021, NSCIB-20-0108259Side-channel analysis
Physical Tampering, physical tampering, Malfunction, malfunctionStandards
FIPS 180-4, FIPS 197, AIS31, ISO/IEC 14443, ISO/IEC 7816, ISO/IEC 9796-2, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Title | Security Target Lite |
|---|---|
| Subject | NXP SmartePP_P71 - ICAO BAC with optional Active Authentication |
| Keywords | Security Target, ICAO, Basic Access Control (BAC) |
| Author | NXP B.V. |
| Creation date | D:20210302092602Z |
| Modification date | D:20210302092708Z |
| Pages | 36 |
| Creator | DITA Open Toolkit 2.5.4 |
| Producer | Apache FOP Version 1.1 |
References
Outgoing- BSI-DSZ-CC-1136-2021 - archived - NXP Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2)
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
NSCIB-CC-0108259-CRExtracted SARs
ALC_DVS.2, ALC_FLR.1, ASE_TSS.2Similar certificates
| Name | Certificate ID | |
|---|---|---|
| NXP SmartePP Enhanced/Next-gen on P71 version 03 00 00 10 | NSCIB-CC-0108263-CR | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB%20certificate%20CC-21-0108259.pdf",
"dgst": "eb16930fe7d45006",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-0108259-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"10",
"00",
"03"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"60455fc9564e2545"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1136-2021"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1136-2021"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1136-2021"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1136-2021"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-10-12",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0108259-MA-1.0.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0108259-STLite-v1.8.pdf",
"maintenance_title": "Assurance Continuity Maintenance Report"
}
]
},
"manufacturer": "NXP Semiconductors Germany GmbH",
"manufacturer_web": "https://www.nxp.com",
"name": "NXP SmartePP Classic on P71 version 03 00 00 10",
"not_valid_after": "2026-05-12",
"not_valid_before": "2021-05-12",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "NSCIB certificate CC-21-0108259.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-21-0108259": 1
}
},
"cc_claims": {
"R": {
"R.L": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055-": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 2,
"EAL4 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Riscure": {
"Riscure": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 1,
"ISO/IEC 15408-2": 1,
"ISO/IEC 15408-3": 1,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 1,
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "NSCIB-CC-0108259-Certification Report(BAC).pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-0108259-CR",
"cert_item": "NXP SmartePP on P71, version 03 00 00 10",
"cert_lab": " Riscure B.V",
"developer": "NXP Semiconductors Germany GmbH"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1136-2021": 1
},
"NL": {
"NSCIB-CC-0108259-CR": 11
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055-2009": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 2,
"ALC_FLR.1": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL4+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Generic": {
"Crypto Library 0.7.6": 1
}
},
"crypto_protocol": {
"PACE": {
"PACE": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Riscure": {
"Riscure": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JHAS": 1,
"JIL": 2,
"JIL-AAPS": 2,
"JIL-AM": 2
}
},
"standard_id": {
"ICAO": {
"ICAO": 9
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 18,
"NXP Semiconductors": 4
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "D:20210512105237+02\u002700\u0027",
"/Creator": "",
"/Keywords": "",
"/ModDate": "D:20210512105237+02\u002700\u0027",
"/Producer": "Foxit Reader PDF Printer Version 7.1.0.112",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 179566,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 11
},
"st_filename": "smart_ePP_BAC_Lite_v1.3_20210302.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 3
}
},
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1136-2021": 1
},
"NL": {
"NSCIB-20-0108259": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055": 3,
"BSI-CC-PP-0055-2009": 2,
"BSI-CC-PP-0084-2014": 1,
"BSI-CC-PP0035-2007": 1,
"BSI-CC-PP0055": 6,
"BSI-CC-PP0056": 1,
"BSI-PP-CC-0055": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 2,
"ALC_FLR.1": 3
},
"ASE": {
"ASE_TSS.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 4+": 1,
"EAL 6+": 2,
"EAL4": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_CKM.4.1": 1,
"FAU_SAS": 1,
"FAU_SAS.1": 4
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 14,
"FCS_CKM.4": 20,
"FCS_COP": 65,
"FCS_COP.1": 3,
"FCS_RND.1": 18,
"FCS_RND.1.1": 1,
"FCS_RNG": 1
},
"FDP": {
"FDP_ACC.1": 5,
"FDP_ACF.1": 5,
"FDP_ACF.1.2": 4,
"FDP_ACF.1.4": 3,
"FDP_ITC": 1,
"FDP_ITC.1": 6,
"FDP_ITC.2": 6,
"FDP_UCT.1": 7,
"FDP_UIT.1": 8
},
"FIA": {
"FIA_ACC.1": 1,
"FIA_ACF.1": 1,
"FIA_AFL.1": 9,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 7,
"FIA_API.1": 12,
"FIA_API.1.1": 1,
"FIA_UAU": 1,
"FIA_UAU.1": 12,
"FIA_UAU.4": 12,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 16,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 5,
"FIA_UCT.1": 1,
"FIA_UID.1": 8
},
"FMT": {
"FMT_LIM": 1,
"FMT_LIM.1": 3,
"FMT_LIM.2": 3,
"FMT_MTD": 33,
"FMT_MTD.1": 2,
"FMT_SMF.1": 9,
"FMT_SMR.1": 12
},
"FPT": {
"FPT_FLS.1": 4,
"FPT_PHP.3": 5,
"FPT_TST.1": 12
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 2
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 5,
"EF.DG1": 8,
"EF.DG15": 4,
"EF.DG16": 8,
"EF.DG2": 3,
"EF.DG3": 3,
"EF.DG4": 3,
"EF.DG5": 3,
"EF.SOD": 5
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 1,
"Physical Tampering": 2,
"malfunction": 1,
"physical tampering": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 1
},
"CC": {
"CCMB-2017-04-001": 2,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 2
},
"FIPS": {
"FIPS 180-4": 1,
"FIPS 197": 1
},
"ICAO": {
"ICAO": 50
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816": 2,
"ISO/IEC 9796-2": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"TDES": 6,
"Triple-DES": 5
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"KMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 92,
"NXP Semiconductors": 27
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "NXP B.V.",
"/CreationDate": "D:20210302092602Z",
"/Creator": "DITA Open Toolkit 2.5.4",
"/Keywords": "Security Target, ICAO, Basic Access Control (BAC)",
"/ModDate": "D:20210302092708Z",
"/PDFVersion": "1.4",
"/Producer": "Apache FOP Version 1.1",
"/Subject": "NXP SmartePP_P71 - ICAO BAC with optional Active Authentication",
"/Title": "Security Target Lite",
"pdf_file_size_bytes": 299864,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 36
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0108259-Certification%20Report(BAC).pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL4+",
"ALC_FLR.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/smart_ePP_BAC_Lite_v1.3_20210302.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "b2a38790ce235c1f3d80879844fd132ab947b7c4c7c9f1ca28964c9a2ab14958",
"txt_hash": "ef71da99fdd21127e941ac75bae1b3afdc2c292e0dd8ae274b4f625e111961a7"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "47e22fa3e181e82607ba5fdeb448cf0c6e7e4c11c7b930ca0a57b70349830646",
"txt_hash": "8fb6b72cfdf768fd6ede2f1286c77bde13e107345d19da69e12f195fb92ea044"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "5746b1ca875b5a62d1551f38101b82f1f28733d1b2c14f6e84d046f636c1f84d",
"txt_hash": "fb598f11dfed8c48c5d7456a02b3b26769d320762ff45370b1515f1d54dc80f3"
}
},
"status": "active"
}