P73N2M0B0.2C2/2C6 (B0.2C2 / B0.2C6) (ANSSI-CC-2019/62-R01)

CSV information ?

Status active
Valid from 14.06.2024
Valid until 14.06.2029
Scheme 🇫🇷 FR
Manufacturer NXP Semiconductors
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_FLR.1, AVA_VAN.5, ALC_DVS.2, ADV_INT.3, ASE_TSS.2, ALC_CMC.5, ATE_FUN.2, ATE_COV.3, ALC_TAT.3, ADV_IMP.2, ADV_TDS.5, EAL5+
Protection profiles

Heuristics summary ?

Certificate ID: ANSSI-CC-2019/62-R01

Certificate ?

Extracted keywords

Vendor
NXP

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_TAT.3, ALC_FLR.1, ATE_COV.3, ATE_FUN.2, AVA_VAN.5, ASE_TSS.2
Protection profiles
BSI-CC-PP-0084-2014
Certificates
ANSSI-CC-2019/62-R01
Evaluation facilities
SERMA

File metadata

Creation date D:20240704092041+02'00'
Modification date D:20240704092612+02'00'
Pages 2
Creator Acrobat PDFMaker 23 pour Word
Producer Adobe PDF Library 23.1.175

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, HMAC
Asymmetric Algorithms
ECC
Hash functions
SHA-3
Randomness
RNG

Vendor
NXP

Security level
EAL5, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_TAT.3, ALC_FLR.1, ALC_FLR, ATE_COV.3, ATE_FUN.2, AVA_VAN.5, AVA_VAN, ASE_TSS.2
Protection profiles
BSI-CC-PP-0084-2014, BSI-PP-0084-2014
Certificates
ANSSI-CC-2019/62-R01
Evaluation facilities
SERMA, CESTI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Keywords [ANSSI Crypto]
Creation date D:20240709100421+02'00'
Modification date D:20240709100557+02'00'
Pages 15
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES, TDEA, SEED
Asymmetric Algorithms
ECC
Randomness
RNG, RND
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM

Vendor
NXP, NXP Semiconductors, NXP Semiconductors N.V

Security level
EAL4, EAL5, EAL5+, EAL4 augmented, EAL5 augmented
Claims
O.C, O.RND, O.TDES, O.AES, O.MEM-ACCESS, O.SFR-ACCESS, O.FLASH-INTEGRITY, O.GCM-SUPPORT, O.CRC, O.FLASH-, T.RND, R.O
Security Assurance Requirements (SAR)
ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_ARC.1, ADV_FSP.5, ADV_FSP, ADV_FSP.4, ADV_IMP, ADV_IMP.1, ADV_CMC.5, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.5, ALC_TAT.3, ALC_FLR.1, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_CMC, ALC_CMC.4, ALC_CMS, ALC_CMS.4, ALC_COV.2, ALC_COV.3, ATE_COV.3, ATE_FUN.2, ATE_DPT.3, ATE_IND.2, ATE_COV, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_SAS.1.1, FCS_RNG, FCS_RNG.1, FCS_COP.1, FCS_CKM.4, FCS_COP, FCS_CKM.1, FCS_CKM, FCS_SDI.2, FDP_SDC, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_SDI.1.1, FDP_SDI, FDP_SDI.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACC, FDP_ACF, FDP_MSA, FDP_SMF.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_MSA, FMT_SMR.1, FMT_SMF.1.1, FMT_MAS.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_FLS.1
Protection profiles
BSI-PP-0084-2014
Certification process
out of scope, allows NXP to develop sales products composed of P73N2M0B0.202 and Services Software, which are out of scope of this Security Target. NXP Semiconductors P73N2M0B0.202 Security Target Lite P73N2M0B0.202 All

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, Malfunction, malfunction
Certification process
out of scope, allows NXP to develop sales products composed of P73N2M0B0.202 and Services Software, which are out of scope of this Security Target. NXP Semiconductors P73N2M0B0.202 Security Target Lite P73N2M0B0.202 All

Standards
FIPS 140-2, NIST SP 800-67, NIST SP 800-38A, NIST SP 800-38D, AIS31, ISO/IEC 7816, CCMB-2017-04-002, CCMB-2017-04-001, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Keywords NXP, P73N2M0B0.202, Secure Microcontroller, Secure Processor, Common Criteria, Security Target Lite
Creation date D:20181104204050+01'00'
Modification date D:20231205212054+01'00'
Pages 60
Creator DITA Open Toolkit
Producer Apache FOP Version 1.1

Heuristics ?

Certificate ID: ANSSI-CC-2019/62-R01

Extracted SARs

ALC_CMC.5, ALC_DVS.2, ATE_FUN.2, ALC_COV.3, ALC_FLR.1, ATE_DPT.3, ASE_CCL.1, ALC_LCD.1, ADV_CMC.5, ALC_CMS.5, ATE_COV.3, AGD_OPE.1, ALC_TAT.3, ADV_INT.3, ASE_OBJ.2, ADV_FSP.5, ALC_DEL.1, ATE_IND.2, ADV_IMP.2, ASE_INT.1, ADV_ARC.1, ASE_REQ.2, AGD_PRE.1, AVA_VAN.5, ASE_ECD.1, ADV_TDS.5, ASE_TSS.2, ASE_SPD.1

Scheme data ?

Product P73N2M0B0.2C2/2C6 (B0.2C2 / B0.2C6)
Url https://cyber.gouv.fr/produits-certifies/p73n2m0b02c22c6-b02c2-b02c6
Description Le produit évalué est « P73N2M0B0.2C2/2C6, B0.2C2 / B0.2C6 » développé par NXP SEMICONDUCTORS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés, applicatio
Sponsor NXP SEMICONDUCTORS
Developer NXP SEMICONDUCTORS
Cert Id ANSSI-CC-2019/62-R01
Level EAL5+
Expiration Date 14 Juin 2029
Enhanced
Cert Id ANSSI-CC-2019/62-R01
Certification Date 14/06/2024
Expiration Date 14/06/2029
Category Micro-circuits
Cc Version Critères Communs version 3.1r5
Developer NXP SEMICONDUCTORS
Sponsor NXP SEMICONDUCTORS
Evaluation Facility SERMA SAFETY & SECURITY
Level EAL5+
Protection Profile Security IC Platform Protection Profile with Augmentation Packages version 1.0, BSI-CC-PP-0084-2014
Mutual Recognition CCRA SOG-IS
Augmented ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_TAT.3, ALC_FLR.1, ATE_COV.3, ATE_FUN.2, ASE_TSS.2, AVA_VAN.5)
Cert Link https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2019_62-R01.pdf
Report Link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2019_62-R01%20P73N2M0B0_0.pdf

References ?

No references are available for this certificate.

Updates ?

  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC']}}]}.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'P73N2M0B0.2C2/2C6 (B0.2C2 / B0.2C6)', 'url': 'https://cyber.gouv.fr/produits-certifies/p73n2m0b02c22c6-b02c2-b02c6', 'description': 'Le produit Ă©valuĂ© est « P73N2M0B0.2C2/2C6, B0.2C2 / B0.2C6 » dĂ©veloppĂ© par NXP SEMICONDUCTORS.\nLe microcontrĂ´leur seul n’est pas un produit utilisable en tant que tel. Il est destinĂ© Ă  hĂ©berger une ou plusieurs applications. Il peut ĂŞtre insĂ©rĂ© dans un support plastique pour constituer une carte Ă  puce. Les usages possibles de cette carte sont multiples (documents d’identitĂ© sĂ©curisĂ©s, applicatio', 'sponsor': 'NXP SEMICONDUCTORS', 'developer': 'NXP SEMICONDUCTORS', 'cert_id': 'ANSSI-CC-2019/62-R01', 'level': 'EAL5+', 'expiration_date': '14 Juin 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2019/62-R01', 'certification_date': '14/06/2024', 'expiration_date': '14/06/2029', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'NXP SEMICONDUCTORS', 'sponsor': 'NXP SEMICONDUCTORS', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Security IC Platform Protection Profile with Augmentation Packages version 1.0, BSI-CC-PP-0084-2014', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_TAT.3, ALC_FLR.1, ATE_COV.3, ATE_FUN.2, ASE_TSS.2, AVA_VAN.5)', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2019_62-R01.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2019_62-R01%20P73N2M0B0_0.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '044913431206e243aa00320bc31c0533eca97689b7d2877db717e5819b1c5246', 'txt_hash': 'fa9b942bbfdd655cc8770e07a29efecc823e95b9160f807fa89cf493e8f74632'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c16888ff252e8fc2df63210b47de0d63d4c5ed8bc0c42d19a9dbc29fb0131919', 'txt_hash': '2e72713cdf8f626d6028e07d027b7f76cb7b183ba11f1fe729e0198535992c1d'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 972361, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 60, '/CreationDate': "D:20181104204050+01'00'", '/Creator': 'DITA Open Toolkit', '/Keywords': 'NXP, P73N2M0B0.202, Secure\n Microcontroller, Secure Processor, Common Criteria, Security Target Lite', '/ModDate': "D:20231205212054+01'00'", '/PDFVersion': '1.4', '/Producer': 'Apache FOP Version 1.1', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 170217, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20240704092041+02'00'", '/Creator': 'Acrobat PDFMaker 23 pour Word', '/Keywords': '', '/ModDate': "D:20240704092612+02'00'", '/Producer': 'Adobe PDF Library 23.1.175', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 2}}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL5': 5, 'EAL5+': 1, 'EAL4 augmented': 2, 'EAL5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 5, 'ADV_INT.3': 2, 'ADV_TDS.5': 2, 'ADV_ARC.1': 1, 'ADV_FSP.5': 3, 'ADV_FSP': 1, 'ADV_FSP.4': 2, 'ADV_IMP': 1, 'ADV_IMP.1': 3, 'ADV_CMC.5': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 4, 'ALC_CMC.5': 4, 'ALC_TAT.3': 2, 'ALC_FLR.1': 4, 'ALC_CMS.5': 3, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_CMC': 1, 'ALC_CMC.4': 4, 'ALC_CMS': 1, 'ALC_CMS.4': 2, 'ALC_COV.2': 2, 'ALC_COV.3': 2}, 'ATE': {'ATE_COV.3': 2, 'ATE_FUN.2': 2, 'ATE_DPT.3': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_TSS.2': 4, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 1, 'FAU_SAS.1': 6, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG': 5, 'FCS_RNG.1': 5, 'FCS_COP.1': 8, 'FCS_CKM.4': 14, 'FCS_COP': 31, 'FCS_CKM.1': 13, 'FCS_CKM': 13, 'FCS_SDI.2': 1}, 'FDP': {'FDP_SDC': 1, 'FDP_SDC.1': 7, 'FDP_SDI.2': 6, 'FDP_ITT.1': 8, 'FDP_IFC.1': 13, 'FDP_SDI.1.1': 1, 'FDP_SDI': 13, 'FDP_SDI.1': 2, 'FDP_ITC.1': 13, 'FDP_ITC.2': 13, 'FDP_ACC.1': 14, 'FDP_ACF.1': 10, 'FDP_ACC': 12, 'FDP_ACF': 12, 'FDP_MSA': 8, 'FDP_SMF.1': 4}, 'FMT': {'FMT_LIM': 1, 'FMT_LIM.1': 5, 'FMT_LIM.2': 4, 'FMT_MSA.1': 9, 'FMT_MSA.3': 12, 'FMT_SMF.1': 12, 'FMT_MSA': 20, 'FMT_SMR.1': 9, 'FMT_SMF.1.1': 1, 'FMT_MAS.1': 1}, 'FPT': {'FPT_FLS.1': 10, 'FPT_PHP.3': 8, 'FPT_ITT.1': 8}, 'FRU': {'FRU_FLT.2': 10}, 'FTP': {'FTP_FLS.1': 1}}, 'cc_claims': {'O': {'O.C': 1, 'O.RND': 3, 'O.TDES': 7, 'O.AES': 7, 'O.MEM-ACCESS': 8, 'O.SFR-ACCESS': 8, 'O.FLASH-INTEGRITY': 6, 'O.GCM-SUPPORT': 8, 'O.CRC': 8, 'O.FLASH-': 1}, 'T': {'T.RND': 2}, 'R': {'R.O': 1}}, 'vendor': {'NXP': {'NXP': 56, 'NXP Semiconductors': 36, 'NXP Semiconductors N.V': 59}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 37}}, 'DES': {'DES': {'DES': 9}, '3DES': {'Triple-DES': 9, 'TDES': 17, 'TDEA': 2}}, 'miscellaneous': {'SEED': {'SEED': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 12, 'RND': 5}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 6}, 'CTR': {'CTR': 5}, 'CFB': {'CFB': 5}, 'OFB': {'OFB': 5}, 'GCM': {'GCM': 21}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 5, 'Physical Probing': 2, 'physical probing': 2, 'side channel': 2}, 'FI': {'Malfunction': 6, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}, 'NIST': {'NIST SP 800-67': 2, 'NIST SP 800-38A': 4, 'NIST SP 800-38D': 2}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 7816': 8}, 'CC': {'CCMB-2017-04-002': 2, 'CCMB-2017-04-001': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'allows NXP to develop sales products composed of P73N2M0B0.202 and Services Software, which are out of scope of this Security Target. NXP Semiconductors P73N2M0B0.202 Security Target Lite P73N2M0B0.202 All': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2019/62-R01': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 1}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1}, 'ALC': {'ALC_CMC.5': 1, 'ALC_DVS.2': 1, 'ALC_TAT.3': 1, 'ALC_FLR.1': 2}, 'ATE': {'ATE_COV.3': 1, 'ATE_FUN.2': 1}, 'AVA': {'AVA_VAN.5': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 2}}, 'eval_facility': {'Serma': {'SERMA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to ANSSI-cible-CC-2019_62-R01 IC.pdf.
    • The cert_filename property was set to Certificat-CC-2019_62-R01.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2019_62-R01%20P73N2M0B0.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2019_62-R01%20IC.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '03c7e9496f610a28e7325d4f1398e6bc7a1153575b798cf677232388e2f13ac4', 'txt_hash': 'e4273aee6f7a510f161c6073f321c7b18898adfc8fba210620e516ed0f709ac5'} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 280742, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/CreationDate': "D:20240709100421+02'00'", '/Creator': 'Microsoft® Word 2019', '/Keywords': '[ANSSI Crypto]', '/ModDate': "D:20240709100557+02'00'", '/Producer': 'Microsoft® Word 2019', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/', 'http://www.commoncriteriaportal.org/', 'http://www.sogis.eu/']}}.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2019/62-R01': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL5': 1, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 ElevĂ©': 1}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_TDS.5': 1}, 'ALC': {'ALC_CMC.5': 1, 'ALC_DVS.2': 1, 'ALC_TAT.3': 1, 'ALC_FLR.1': 2, 'ALC_FLR': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_FUN.2': 1}, 'AVA': {'AVA_VAN.5': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 3}}, 'eval_facility': {'Serma': {'SERMA': 1}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 1}}, 'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA3': {'SHA-3': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to None.
    • The report_filename property was set to ANSSI-CC-2019_62-R01 P73N2M0B0.pdf.
    • The cert_filename property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'P73N2M0B0.2C2/2C6 (B0.2C2 / B0.2C6)', 'url': 'https://cyber.gouv.fr/produits-certifies/p73n2m0b02c22c6-b02c2-b02c6', 'description': 'Le produit Ă©valuĂ© est « P73N2M0B0.2C2/2C6, B0.2C2 / B0.2C6 » dĂ©veloppĂ© par NXP SEMICONDUCTORS.\nLe microcontrĂ´leur seul n’est pas un produit utilisable en tant que tel. Il est destinĂ© Ă  hĂ©berger une ou plusieurs applications. Il peut ĂŞtre insĂ©rĂ© dans un support plastique pour constituer une carte Ă  puce. Les usages possibles de cette carte sont multiples (documents d’identitĂ© sĂ©curisĂ©s, applicatio', 'sponsor': 'NXP SEMICONDUCTORS', 'developer': 'NXP SEMICONDUCTORS', 'cert_id': 'ANSSI-CC-2019/62-R01', 'level': 'EAL5+', 'expiration_date': '14 Juin 2029', 'enhanced': {'cert_id': 'ANSSI-CC-2019/62-R01', 'certification_date': '14/06/2024', 'expiration_date': '14/06/2029', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'NXP SEMICONDUCTORS', 'sponsor': 'NXP SEMICONDUCTORS', 'evaluation_facility': 'SERMA SAFETY & SECURITY', 'level': 'EAL5+', 'protection_profile': 'Security IC Platform Protection Profile with Augmentation Packages version 1.0, BSI-CC-PP-0084-2014', 'mutual_recognition': 'CCRA\n SOG-IS', 'augmented': 'ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_TAT.3, ALC_FLR.1, ATE_COV.3, ATE_FUN.2, ASE_TSS.2, AVA_VAN.5)', 'cert_link': 'https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2019_62-R01.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2019_62-R01%20P73N2M0B0_0.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name P73N2M0B0.2C2/2C6 (B0.2C2 / B0.2C6) (ANSSI-CC-2019/62-R01) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2019_62-R01.pdf",
  "dgst": "faf124871d38f383",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2019/62-R01",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "0.2"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2019/62-R01",
      "description": "Le produit \u00e9valu\u00e9 est \u00ab P73N2M0B0.2C2/2C6, B0.2C2 / B0.2C6 \u00bb d\u00e9velopp\u00e9 par NXP SEMICONDUCTORS.\nLe microcontr\u00f4leur seul n\u2019est pas un produit utilisable en tant que tel. Il est destin\u00e9 \u00e0 h\u00e9berger une ou plusieurs applications. Il peut \u00eatre ins\u00e9r\u00e9 dans un support plastique pour constituer une carte \u00e0 puce. Les usages possibles de cette carte sont multiples (documents d\u2019identit\u00e9 s\u00e9curis\u00e9s, applicatio",
      "developer": "NXP SEMICONDUCTORS",
      "enhanced": {
        "augmented": "ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_DVS.2, ALC_TAT.3, ALC_FLR.1, ATE_COV.3, ATE_FUN.2, ASE_TSS.2, AVA_VAN.5)",
        "category": "Micro-circuits",
        "cc_version": "Crit\u00e8res Communs version 3.1r5",
        "cert_id": "ANSSI-CC-2019/62-R01",
        "cert_link": "https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2019_62-R01.pdf",
        "certification_date": "14/06/2024",
        "developer": "NXP SEMICONDUCTORS",
        "evaluation_facility": "SERMA SAFETY \u0026 SECURITY",
        "expiration_date": "14/06/2029",
        "level": "EAL5+",
        "mutual_recognition": "CCRA\n                          SOG-IS",
        "protection_profile": "Security IC Platform Protection Profile with Augmentation Packages version 1.0, BSI-CC-PP-0084-2014",
        "report_link": "https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2019_62-R01%20P73N2M0B0_0.pdf",
        "sponsor": "NXP SEMICONDUCTORS"
      },
      "expiration_date": "14 Juin 2029",
      "level": "EAL5+",
      "product": "P73N2M0B0.2C2/2C6 (B0.2C2 / B0.2C6)",
      "sponsor": "NXP SEMICONDUCTORS",
      "url": "https://cyber.gouv.fr/produits-certifies/p73n2m0b02c22c6-b02c2-b02c6"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors",
  "manufacturer_web": "https://www.nxp.com/",
  "name": "P73N2M0B0.2C2/2C6 (B0.2C2 / B0.2C6) (ANSSI-CC-2019/62-R01)",
  "not_valid_after": "2029-06-14",
  "not_valid_before": "2024-06-14",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-CC-2019_62-R01.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2019/62-R01": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_IMP.2": 1,
          "ADV_INT.3": 1,
          "ADV_TDS.5": 1
        },
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 2,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.3": 1,
          "ATE_FUN.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20240704092041+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 23 pour Word",
      "/Keywords": "",
      "/ModDate": "D:20240704092612+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 23.1.175",
      "pdf_file_size_bytes": 170217,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2019_62-R01 P73N2M0B0.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2019/62-R01": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1,
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_IMP.2": 1,
          "ADV_INT.3": 1,
          "ADV_TDS.5": 1
        },
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 2,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.3": 1,
          "ATE_FUN.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "Serma": {
          "SERMA": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA3": {
            "SHA-3": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240709100421+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "[ANSSI Crypto]",
      "/ModDate": "D:20240709100557+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 280742,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/",
          "mailto:[email protected]",
          "http://www.ssi.gouv.fr/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "ANSSI-cible-CC-2019_62-R01 IC.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.AES": 7,
          "O.C": 1,
          "O.CRC": 8,
          "O.FLASH-": 1,
          "O.FLASH-INTEGRITY": 6,
          "O.GCM-SUPPORT": 8,
          "O.MEM-ACCESS": 8,
          "O.RND": 3,
          "O.SFR-ACCESS": 8,
          "O.TDES": 7
        },
        "R": {
          "R.O": 1
        },
        "T": {
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084-2014": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_CMC.5": 2,
          "ADV_FSP": 1,
          "ADV_FSP.4": 2,
          "ADV_FSP.5": 3,
          "ADV_IMP": 1,
          "ADV_IMP.1": 3,
          "ADV_IMP.2": 5,
          "ADV_INT.3": 2,
          "ADV_TDS.5": 2
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 4,
          "ALC_CMC.5": 4,
          "ALC_CMS": 1,
          "ALC_CMS.4": 2,
          "ALC_CMS.5": 3,
          "ALC_COV.2": 2,
          "ALC_COV.3": 2,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 4,
          "ALC_FLR.1": 4,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.2": 4
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.3": 2,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 2,
          "EAL5": 5,
          "EAL5 augmented": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS": 1,
          "FAU_SAS.1": 6,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 13,
          "FCS_CKM.1": 13,
          "FCS_CKM.4": 14,
          "FCS_COP": 31,
          "FCS_COP.1": 8,
          "FCS_RNG": 5,
          "FCS_RNG.1": 5,
          "FCS_SDI.2": 1
        },
        "FDP": {
          "FDP_ACC": 12,
          "FDP_ACC.1": 14,
          "FDP_ACF": 12,
          "FDP_ACF.1": 10,
          "FDP_IFC.1": 13,
          "FDP_ITC.1": 13,
          "FDP_ITC.2": 13,
          "FDP_ITT.1": 8,
          "FDP_MSA": 8,
          "FDP_SDC": 1,
          "FDP_SDC.1": 7,
          "FDP_SDI": 13,
          "FDP_SDI.1": 2,
          "FDP_SDI.1.1": 1,
          "FDP_SDI.2": 6,
          "FDP_SMF.1": 4
        },
        "FMT": {
          "FMT_LIM": 1,
          "FMT_LIM.1": 5,
          "FMT_LIM.2": 4,
          "FMT_MAS.1": 1,
          "FMT_MSA": 20,
          "FMT_MSA.1": 9,
          "FMT_MSA.3": 12,
          "FMT_SMF.1": 12,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 9
        },
        "FPT": {
          "FPT_FLS.1": 10,
          "FPT_ITT.1": 8,
          "FPT_PHP.3": 8
        },
        "FRU": {
          "FRU_FLT.2": 10
        },
        "FTP": {
          "FTP_FLS.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "allows NXP to develop sales products composed of P73N2M0B0.202 and Services Software, which are out of scope of this Security Target. NXP Semiconductors P73N2M0B0.202 Security Target Lite P73N2M0B0.202 All": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CFB": {
          "CFB": 5
        },
        "CTR": {
          "CTR": 5
        },
        "ECB": {
          "ECB": 2
        },
        "GCM": {
          "GCM": 21
        },
        "OFB": {
          "OFB": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 5,
          "RNG": 12
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 6,
          "malfunction": 1
        },
        "SCA": {
          "Leak-Inherent": 5,
          "Physical Probing": 2,
          "physical probing": 2,
          "side channel": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS 140-2": 1
        },
        "ISO": {
          "ISO/IEC 7816": 8
        },
        "NIST": {
          "NIST SP 800-38A": 4,
          "NIST SP 800-38D": 2,
          "NIST SP 800-67": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 37
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 2,
            "TDES": 17,
            "Triple-DES": 9
          },
          "DES": {
            "DES": 9
          }
        },
        "miscellaneous": {
          "SEED": {
            "SEED": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 56,
          "NXP Semiconductors": 36,
          "NXP Semiconductors N.V": 59
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20181104204050+01\u002700\u0027",
      "/Creator": "DITA Open Toolkit",
      "/Keywords": "NXP, P73N2M0B0.202, Secure\n    Microcontroller, Secure Processor, Common Criteria, Security Target Lite",
      "/ModDate": "D:20231205212054+01\u002700\u0027",
      "/PDFVersion": "1.4",
      "/Producer": "Apache FOP Version 1.1",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 972361,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 60
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "BAROC_SC_PP_V1.0",
            "JAVA_OC",
            "SECURITY_IC_AUGP_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
        "pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2019_62-R01%20P73N2M0B0.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "AVA_VAN.5",
      "ATE_COV.3",
      "ALC_CMC.5",
      "ADV_INT.3",
      "ASE_TSS.2",
      "ALC_TAT.3",
      "ADV_TDS.5",
      "ATE_FUN.2",
      "ADV_IMP.2",
      "EAL5+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2019_62-R01%20IC.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c16888ff252e8fc2df63210b47de0d63d4c5ed8bc0c42d19a9dbc29fb0131919",
      "txt_hash": "2e72713cdf8f626d6028e07d027b7f76cb7b183ba11f1fe729e0198535992c1d"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "03c7e9496f610a28e7325d4f1398e6bc7a1153575b798cf677232388e2f13ac4",
      "txt_hash": "e4273aee6f7a510f161c6073f321c7b18898adfc8fba210620e516ed0f709ac5"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "044913431206e243aa00320bc31c0533eca97689b7d2877db717e5819b1c5246",
      "txt_hash": "fa9b942bbfdd655cc8770e07a29efecc823e95b9160f807fa89cf493e8f74632"
    }
  },
  "status": "active"
}