NXP SN200 Series - Secure Element with Crypto Library SN200_SE B1.1 C04

This certificate has disappeared from the Common Criteria portal listing*. However, there is a certificate that matches this one in the current listing:
NXP SN200 Series - Secure Element with Crypto Library SN200_SE B1.1 C04 NSCIB-CC-217812-CR3 Compare
You can also examine other similar certificates below.

CSV information ?

Status active
Valid from 16.03.2023
Valid until 16.03.2028
Scheme 🇳🇱 NL
Manufacturer NXP Semiconductors
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ASE_TSS.2, EAL6+

Heuristics summary ?

Certificate ID: NSCIB-CC-2200037-01-CR

Certificate ?

Extracted keywords

Vendor
NXP Semiconductors

Security level
EAL6, EAL2, EAL 7, EAL6 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR.3, ALC_FLR, ASE_TSS.2
Protection profiles
BSI-CC-PP-0084-2014
Certificates
NSCIB-CC-23-2200037-01, NSCIB-2200037-01, CC-21-217812
Evaluation facilities
Riscure

Standards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008

File metadata

Title NSCIB Certificate
Author Denise Cater
Creation date D:20230706170634+01'00'
Modification date D:20230706170634+01'00'
Pages 1
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES, SM4, HMAC, CBC-MAC
Asymmetric Algorithms
ECDH, ECDSA, EdDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3
Schemes
MAC
Randomness
TRNG, RNG
Libraries
Crypto Library 1.0.0
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM

JavaCard API constants
SM2
Vendor
NXP Semiconductors, NXP

Security level
EAL4, EAL6, EAL6+, EAL 6, EAL6 augmented, EAL 6 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_TSS.2
Protection profiles
BSI-CC-PP-0084-2014
Certificates
NSCIB-CC-2200037-01-CR, NSCIB-2200037-01, CC-21-217812
Evaluation facilities
Riscure

Side-channel analysis
side-channel, DFA, JIL, JIL-AM
Certification process
out of scope, protocols and implementations: KoreanSeed, OSCCA SM2, OSCCA SM3 and OSCCA SM4, and FeliCa which are out of scope as there are no security claims. Not all key sizes specified in the [ST] have sufficient

Standards
ISO/IEC 7816

File metadata

Title Certification Report
Author Hans-Gerd Albertsen
Creation date D:20230316143829+01'00'
Modification date D:20230316143829+01'00'
Pages 14
Creator Microsoft® Word für Microsoft 365
Producer Microsoft® Word für Microsoft 365

Frontpage

Certificate ID NSCIB-CC-2200037-01-CR
Certified item SN200 Series - Secure Element with Crypto Library SN200_SE B1.1 C04
Certification lab Riscure B.V.
Developer NXP Semiconductors Germany GmbH

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES, TDES, TDEA, SM4, HMAC, CBC-MAC, CMAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, EdDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA3, SHA-3
Schemes
MAC, Key Exchange, Key Agreement
Randomness
RNG, RND
Libraries
Crypto Library 1.0.0
Elliptic Curves
Curve25519, Ed25519, Ed448
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM

JavaCard API constants
SM2
Trusted Execution Environments
SE
Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL6, EAL6+, EAL4 augmented, EAL6 augmented
Claims
O.RND, O.TDES, O.AES, O.MEM-ACCESS, O.SFR-ACCESS, O.FLASH-INTEGRITY, O.GCM-SUPPORT, O.CRC, O.SW_AES, O.SW_DES, O.RSA, O.ECDSA, O.ECC_DHKE, O.ECDAA, O.SHA, O.HMAC, O.EDDSA, O.MONT_DHKE, O.EUICC, O.SW_CRC, O.COPY, O.COMPARE, O.REUSE, O.FLASH-, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, ADV_FSP, ADV_FSP.4, ADV_IMP, ADV_IMP.1, ADV_CMC.5, ADV_CMS.4, ADV_CMS.5, ADV_TDS.1, ADV_TDS.3, ADV_FSP.1, ADV_FSP.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ALC_CMC, ALC_CMC.4, ALC_CMS, ALC_CMS.4, ALC_TAT.1, ALC_CMS.1, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_SAS.1.1, FCS_COP.1, FCS_RNG, FCS_COP, FCS_CKM, FCS_RNG.1, FCS_CKM.4, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4.1, FCS_SDI.2, FDP_SDC, FDP_SOP, FDP_SOP.1, FDP_SOP.1.1, FDP_SOP.1.2, FDP_ITT.1, FDP_IFC.1, FDP_SDC.1, FDP_SDI, FDP_SDC.1.1, FDP_SDI.2, FDP_SDI.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP, FDP_RIP.1.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_MSA, FMT_SMF.1, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1.1, FMT_MAS.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_FLS.1
Protection profiles
BSI-PP-0084-2014

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side-channel, side channel, timing attacks, timing attack, template attacks, Malfunction, malfunction, DFA, fault injection, JIL

Standards
FIPS 140-2, FIPS 197, FIPS PUB 202-2015, FIPS PUB 81-1980, FIPS 198-1, FIPS 202, NIST SP 800-67, NIST SP 800-38A, NIST SP 800-38D, NIST SP 800-38B, NIST SP 800-38C, NIST SP 800-90A, SP 800-38A, SP 800-38D, PKCS #1, PKCS#1, AIS31, AIS20, RFC 8032, RFC 7748, ISO/IEC 7816, ISO/IEC 9797-1, ISO/IEC 14888-3, ISO/IEC 15946-1, ISO/IEC 11889:2015, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title Security Target Lite
Subject SN200 Series - Secure Element with Crypto Library
Keywords NXP, SN200 Series, SN200x Single Chip Secure Element and NFC Controller, Crypto Library, Common Criteria, Security Target Lite
Author NXP B.V.
Creation date D:20210806081218+02'00'
Pages 99
Creator DITA Open Toolkit
Producer Apache FOP Version 1.1

Heuristics ?

Certificate ID: NSCIB-CC-2200037-01-CR

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, ALC_CMC.5, AVA_VAN.5, ATE_IND.2, ADV_IMP.2, ADV_ARC.1, ATE_FUN.2, ASE_SPD.1, ASE_REQ.2, ASE_TSS.2, AGD_OPE.1, ATE_COV.3, ALC_TAT.3, ADV_CMS.5, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ASE_INT.1, ADV_CMC.5, AGD_PRE.1, ADV_TDS.5, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2

Scheme data ?

Manufacturer NXP Semiconductors Germany GmbH
Product SN200 Series – Secure Element with Crypto Library SN200_SE B1.1 C04
Scheme NSCIB
Cert Id CC-20-217812
Manufacturer Link https://www.nxp.com
Level EAL6 augmented with ALC_FLR.1 and ASE_TSS.2
Cert Link https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/12/nscib-cc-20-217812-certificate.pdf
Report Link https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/12/nscib-cc-217812-cr2.pdf
Target Link https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/12/nscib-cc-217812_2-stlite.pdf

References ?

No references are available for this certificate.

Updates ?

  • 30.09.2024 The certificate became unavailable, either the certification report or the security target was unavailable during processing.
    Certificate removed

    A Common Criteria certificate for a product named NXP SN200 Series - Secure Element with Crypto Library SN200_SE B1.1 C04 is not available. This means that either its certification report or security target could not be downloaded during processing.

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ca60b8bdfa7006540ce29c7061515d507269bd15e92a15b020fe551d7726f93c', 'txt_hash': '56dc30fb938ea5f8158707b08c97ceb426175087fcbce010430d3026bc0c8a08'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4642bd43ad5bcac052e0989473ba7e9a41dd6a01ae4bdc3d927a327f4a5d701e', 'txt_hash': 'eb08a0033329b8bff03863115af556802fe5df9abae0a54b698f2bbf68790484'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 670271, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 99, '/Title': 'Security Target Lite', '/Author': 'NXP B.V.', '/Subject': 'SN200 Series - Secure Element with Crypto Library', '/Keywords': 'NXP, SN200 Series, SN200x Single Chip Secure Element and NFC Controller,\n Crypto Library, Common Criteria, Security Target Lite', '/Creator': 'DITA Open Toolkit', '/Producer': 'Apache FOP Version 1.1', '/CreationDate': "D:20210806081218+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 131098, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'NSCIB Certificate', '/Author': 'Denise Cater', '/Creator': 'Microsoft® Word 2021', '/CreationDate': "D:20230706170634+01'00'", '/ModDate': "D:20230706170634+01'00'", '/Producer': 'Microsoft® Word 2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.tuv-nederland.nl/']}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084-2014': 2}}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL6': 15, 'EAL6+': 2, 'EAL4 augmented': 2, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.5': 6, 'ADV_IMP.2': 5, 'ADV_INT.3': 2, 'ADV_SPM.1': 5, 'ADV_TDS.5': 1, 'ADV_FSP': 1, 'ADV_FSP.4': 4, 'ADV_IMP': 1, 'ADV_IMP.1': 6, 'ADV_CMC.5': 2, 'ADV_CMS.4': 1, 'ADV_CMS.5': 1, 'ADV_TDS.1': 7, 'ADV_TDS.3': 4, 'ADV_FSP.1': 1, 'ADV_FSP.2': 4, 'ADV_TDS.4': 1}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_FLR.1': 5, 'ALC_CMC.5': 5, 'ALC_CMS.5': 4, 'ALC_DEL.1': 2, 'ALC_LCD.1': 4, 'ALC_TAT.3': 2, 'ALC_CMC': 1, 'ALC_CMC.4': 4, 'ALC_CMS': 1, 'ALC_CMS.4': 2, 'ALC_TAT.1': 6, 'ALC_CMS.1': 1}, 'ATE': {'ATE_COV.3': 4, 'ATE_DPT.3': 1, 'ATE_FUN.2': 2, 'ATE_IND.2': 1, 'ATE_COV': 1, 'ATE_COV.2': 2, 'ATE_FUN.1': 5, 'ATE_COV.1': 3, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_TSS.2': 5, 'ASE_CCL.1': 2, 'ASE_ECD.1': 3, 'ASE_INT.1': 4, 'ASE_OBJ.2': 3, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS': 1, 'FAU_SAS.1': 6, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_COP.1': 33, 'FCS_RNG': 25, 'FCS_COP': 133, 'FCS_CKM': 48, 'FCS_RNG.1': 12, 'FCS_CKM.4': 54, 'FCS_CKM.1': 50, 'FCS_CKM.2': 8, 'FCS_CKM.4.1': 1, 'FCS_SDI.2': 1}, 'FDP': {'FDP_SDC': 1, 'FDP_SOP': 16, 'FDP_SOP.1': 9, 'FDP_SOP.1.1': 1, 'FDP_SOP.1.2': 1, 'FDP_ITT.1': 9, 'FDP_IFC.1': 14, 'FDP_SDC.1': 7, 'FDP_SDI': 16, 'FDP_SDC.1.1': 1, 'FDP_SDI.2': 5, 'FDP_SDI.1': 2, 'FDP_ITC.1': 45, 'FDP_ITC.2': 45, 'FDP_ACC': 17, 'FDP_ACF': 17, 'FDP_RIP.1': 7, 'FDP_ACC.1': 13, 'FDP_ACF.1': 9, 'FDP_RIP': 1, 'FDP_RIP.1.1': 1}, 'FMT': {'FMT_LIM': 1, 'FMT_LIM.1': 5, 'FMT_LIM.2': 6, 'FMT_MSA': 38, 'FMT_SMF.1': 18, 'FMT_MSA.3': 11, 'FMT_MSA.1': 8, 'FMT_SMR.1': 9, 'FMT_SMF.1.1': 1, 'FMT_MAS.1': 1}, 'FPT': {'FPT_FLS.1': 12, 'FPT_PHP.3': 10, 'FPT_ITT.1': 9}, 'FRU': {'FRU_FLT.2': 12}, 'FTP': {'FTP_FLS.1': 1}}, 'cc_claims': {'O': {'O.RND': 9, 'O.TDES': 7, 'O.AES': 7, 'O.MEM-ACCESS': 7, 'O.SFR-ACCESS': 8, 'O.FLASH-INTEGRITY': 6, 'O.GCM-SUPPORT': 8, 'O.CRC': 8, 'O.SW_AES': 5, 'O.SW_DES': 6, 'O.RSA': 5, 'O.ECDSA': 6, 'O.ECC_DHKE': 5, 'O.ECDAA': 6, 'O.SHA': 5, 'O.HMAC': 6, 'O.EDDSA': 5, 'O.MONT_DHKE': 6, 'O.EUICC': 5, 'O.SW_CRC': 5, 'O.COPY': 6, 'O.COMPARE': 5, 'O.REUSE': 7, 'O.FLASH-': 1}, 'T': {'T.RND': 3}}, 'vendor': {'NXP': {'NXP': 172, 'NXP Semiconductors': 32}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 61}}, 'DES': {'DES': {'DES': 16}, '3DES': {'Triple-DES': 22, '3DES': 1, 'TDES': 28, 'TDEA': 2}}, 'miscellaneous': {'SM4': {'SM4': 1}}, 'constructions': {'MAC': {'HMAC': 27, 'CBC-MAC': 10, 'CMAC': 9}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 2}, 'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 23}, 'EdDSA': {'EdDSA': 26}, 'ECC': {'ECC': 43}}, 'FF': {'DH': {'Diffie-Hellman': 15, 'DH': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 16}, 'SHA2': {'SHA-224': 11, 'SHA-256': 11, 'SHA-384': 11, 'SHA-512': 11}, 'SHA3': {'SHA3': 1, 'SHA-3': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KEX': {'Key Exchange': 12}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 57, 'RND': 12}}, 'cipher_mode': {'ECB': {'ECB': 12}, 'CBC': {'CBC': 20}, 'CTR': {'CTR': 14}, 'CFB': {'CFB': 13}, 'OFB': {'OFB': 5}, 'GCM': {'GCM': 29}, 'CCM': {'CCM': 5}}, 'ecc_curve': {'Curve': {'Curve25519': 7}, 'Edwards': {'Ed25519': 3, 'Ed448': 3}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library 1.0.0': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 5, 'Physical Probing': 2, 'physical probing': 2, 'side-channel': 2, 'side channel': 29, 'timing attacks': 4, 'timing attack': 1, 'template attacks': 4}, 'FI': {'Malfunction': 6, 'malfunction': 2, 'DFA': 4, 'fault injection': 1}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1, 'FIPS 197': 1, 'FIPS PUB 202-2015': 3, 'FIPS PUB 81-1980': 1, 'FIPS 198-1': 1, 'FIPS 202': 1}, 'NIST': {'NIST SP 800-67': 4, 'NIST SP 800-38A': 4, 'NIST SP 800-38D': 2, 'NIST SP 800-38B': 1, 'NIST SP 800-38C': 1, 'NIST SP 800-90A': 3, 'SP 800-38A': 1, 'SP 800-38D': 2}, 'PKCS': {'PKCS #1': 8, 'PKCS#1': 4}, 'BSI': {'AIS31': 1, 'AIS20': 1}, 'RFC': {'RFC 8032': 7, 'RFC 7748': 4}, 'ISO': {'ISO/IEC 7816': 6, 'ISO/IEC 9797-1': 2, 'ISO/IEC 14888-3': 1, 'ISO/IEC 15946-1': 1, 'ISO/IEC 11889:2015': 1}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {'curves': {'SM2': 1}}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'NL': {'NSCIB-CC-23-2200037-01': 1, 'NSCIB-2200037-01': 1, 'CC-21-217812': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6': 1, 'EAL2': 1, 'EAL 7': 1, 'EAL6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1, 'ALC_FLR.3': 1, 'ALC_FLR': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP Semiconductors': 1}}, 'eval_facility': {'Riscure': {'Riscure': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408-1': 2, 'ISO/IEC 18045': 4, 'ISO/IEC 18045:2008': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to NSCIB-2200037-01-STLite.pdf.
    • The cert_filename property was set to NSCIB-CC-2200037-01.1-Cert.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2200037-01-CR%20.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2200037-01-STLite.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP SN200 Series - Secure Element with Crypto Library SN200_SE B1.1 C04 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200037-01.1-Cert.pdf",
  "dgst": "b4ef4ed875d62a23",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-2200037-01-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "CC-20-217812",
      "cert_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/12/nscib-cc-20-217812-certificate.pdf",
      "level": "EAL6 augmented with ALC_FLR.1 and ASE_TSS.2",
      "manufacturer": "NXP Semiconductors Germany GmbH",
      "manufacturer_link": "https://www.nxp.com",
      "product": "SN200 Series \u2013 Secure Element with Crypto Library SN200_SE B1.1 C04",
      "report_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/12/nscib-cc-217812-cr2.pdf",
      "scheme": "NSCIB",
      "target_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2020/12/nscib-cc-217812_2-stlite.pdf"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors",
  "manufacturer_web": "https://www.nxp.com/",
  "name": "NXP SN200 Series - Secure Element with Crypto Library SN200_SE B1.1 C04",
  "not_valid_after": "2028-03-16",
  "not_valid_before": "2023-03-16",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "NSCIB-CC-2200037-01.1-Cert.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "CC-21-217812": 1,
          "NSCIB-2200037-01": 1,
          "NSCIB-CC-23-2200037-01": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_FLR.3": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 7": 1,
          "EAL2": 1,
          "EAL6": 1,
          "EAL6 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Riscure": {
          "Riscure": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 18045:2008": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Denise Cater",
      "/CreationDate": "D:20230706170634+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20230706170634+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "NSCIB Certificate",
      "pdf_file_size_bytes": 131098,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.tuv-nederland.nl/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "NSCIB-2200037-01-CR .pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-2200037-01-CR",
        "cert_item": "SN200 Series - Secure Element with Crypto Library SN200_SE B1.1 C04",
        "cert_lab": " Riscure B.V.",
        "developer": "NXP Semiconductors Germany GmbH"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 6
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 3
          },
          "EdDSA": {
            "EdDSA": 2
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "CC-21-217812": 2,
          "NSCIB-2200037-01": 1,
          "NSCIB-CC-2200037-01-CR": 14
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR.1": 2
        },
        "ASE": {
          "ASE_TSS.2": 2
        },
        "ATE": {
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL4": 1,
          "EAL6": 2,
          "EAL6 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "protocols and implementations: KoreanSeed, OSCCA SM2, OSCCA SM3 and OSCCA SM4, and FeliCa which are out of scope as there are no security claims. Not all key sizes specified in the [ST] have sufficient": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CFB": {
          "CFB": 1
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 1
        },
        "OFB": {
          "OFB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library 1.0.0": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Riscure": {
          "Riscure": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 2,
            "SHA-384": 2,
            "SHA-512": 2
          },
          "SHA3": {
            "SHA-3": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "SM2": 1
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1
        },
        "SCA": {
          "side-channel": 1
        },
        "other": {
          "JIL": 2,
          "JIL-AM": 1
        }
      },
      "standard_id": {
        "ISO": {
          "ISO/IEC 7816": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1,
            "HMAC": 2
          }
        },
        "miscellaneous": {
          "SM4": {
            "SM4": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 2,
          "NXP Semiconductors": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Hans-Gerd Albertsen",
      "/CreationDate": "D:20230316143829+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word f\u00fcr Microsoft 365",
      "/ModDate": "D:20230316143829+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word f\u00fcr Microsoft 365",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 303769,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://nscib.nl/",
          "http://www.commoncriteriaportal.org/",
          "https://trustcb.com/common-criteria/nscib/",
          "https://www.tuv-nederland.nl/common-criteria/certificates.html",
          "https://www.sogis.eu/",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "NSCIB-2200037-01-STLite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 43
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 23
          },
          "EdDSA": {
            "EdDSA": 26
          }
        },
        "FF": {
          "DH": {
            "DH": 3,
            "Diffie-Hellman": 15
          }
        },
        "RSA": {
          "RSA-CRT": 2
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.AES": 7,
          "O.COMPARE": 5,
          "O.COPY": 6,
          "O.CRC": 8,
          "O.ECC_DHKE": 5,
          "O.ECDAA": 6,
          "O.ECDSA": 6,
          "O.EDDSA": 5,
          "O.EUICC": 5,
          "O.FLASH-": 1,
          "O.FLASH-INTEGRITY": 6,
          "O.GCM-SUPPORT": 8,
          "O.HMAC": 6,
          "O.MEM-ACCESS": 7,
          "O.MONT_DHKE": 6,
          "O.REUSE": 7,
          "O.RND": 9,
          "O.RSA": 5,
          "O.SFR-ACCESS": 8,
          "O.SHA": 5,
          "O.SW_AES": 5,
          "O.SW_CRC": 5,
          "O.SW_DES": 6,
          "O.TDES": 7
        },
        "T": {
          "T.RND": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084-2014": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 5,
          "ADV_CMC.5": 2,
          "ADV_CMS.4": 1,
          "ADV_CMS.5": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 4,
          "ADV_FSP.4": 4,
          "ADV_FSP.5": 6,
          "ADV_IMP": 1,
          "ADV_IMP.1": 6,
          "ADV_IMP.2": 5,
          "ADV_INT.3": 2,
          "ADV_SPM.1": 5,
          "ADV_TDS.1": 7,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE.1": 4,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 4,
          "ALC_CMC.5": 5,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 2,
          "ALC_CMS.5": 4,
          "ALC_DEL.1": 2,
          "ALC_DVS.2": 6,
          "ALC_FLR.1": 5,
          "ALC_LCD.1": 4,
          "ALC_TAT.1": 6,
          "ALC_TAT.3": 2
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 4,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.2": 5
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 3,
          "ATE_COV.2": 2,
          "ATE_COV.3": 4,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 5,
          "ATE_FUN.2": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 4,
          "EAL4 augmented": 2,
          "EAL6": 15,
          "EAL6 augmented": 1,
          "EAL6+": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS": 1,
          "FAU_SAS.1": 6,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 48,
          "FCS_CKM.1": 50,
          "FCS_CKM.2": 8,
          "FCS_CKM.4": 54,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 133,
          "FCS_COP.1": 33,
          "FCS_RNG": 25,
          "FCS_RNG.1": 12,
          "FCS_SDI.2": 1
        },
        "FDP": {
          "FDP_ACC": 17,
          "FDP_ACC.1": 13,
          "FDP_ACF": 17,
          "FDP_ACF.1": 9,
          "FDP_IFC.1": 14,
          "FDP_ITC.1": 45,
          "FDP_ITC.2": 45,
          "FDP_ITT.1": 9,
          "FDP_RIP": 1,
          "FDP_RIP.1": 7,
          "FDP_RIP.1.1": 1,
          "FDP_SDC": 1,
          "FDP_SDC.1": 7,
          "FDP_SDC.1.1": 1,
          "FDP_SDI": 16,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 5,
          "FDP_SOP": 16,
          "FDP_SOP.1": 9,
          "FDP_SOP.1.1": 1,
          "FDP_SOP.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 1,
          "FMT_LIM.1": 5,
          "FMT_LIM.2": 6,
          "FMT_MAS.1": 1,
          "FMT_MSA": 38,
          "FMT_MSA.1": 8,
          "FMT_MSA.3": 11,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 9
        },
        "FPT": {
          "FPT_FLS.1": 12,
          "FPT_ITT.1": 9,
          "FPT_PHP.3": 10
        },
        "FRU": {
          "FRU_FLT.2": 12
        },
        "FTP": {
          "FTP_FLS.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 20
        },
        "CCM": {
          "CCM": 5
        },
        "CFB": {
          "CFB": 13
        },
        "CTR": {
          "CTR": 14
        },
        "ECB": {
          "ECB": 12
        },
        "GCM": {
          "GCM": 29
        },
        "OFB": {
          "OFB": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library 1.0.0": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "KEX": {
          "Key Exchange": 12
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Curve": {
          "Curve25519": 7
        },
        "Edwards": {
          "Ed25519": 3,
          "Ed448": 3
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 16
          },
          "SHA2": {
            "SHA-224": 11,
            "SHA-256": 11,
            "SHA-384": 11,
            "SHA-512": 11
          },
          "SHA3": {
            "SHA-3": 3,
            "SHA3": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "curves": {
          "SM2": 1
        }
      },
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 12,
          "RNG": 57
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 4,
          "Malfunction": 6,
          "fault injection": 1,
          "malfunction": 2
        },
        "SCA": {
          "Leak-Inherent": 5,
          "Physical Probing": 2,
          "physical probing": 2,
          "side channel": 29,
          "side-channel": 2,
          "template attacks": 4,
          "timing attack": 1,
          "timing attacks": 4
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 1,
          "AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 197": 1,
          "FIPS 198-1": 1,
          "FIPS 202": 1,
          "FIPS PUB 202-2015": 3,
          "FIPS PUB 81-1980": 1
        },
        "ISO": {
          "ISO/IEC 11889:2015": 1,
          "ISO/IEC 14888-3": 1,
          "ISO/IEC 15946-1": 1,
          "ISO/IEC 7816": 6,
          "ISO/IEC 9797-1": 2
        },
        "NIST": {
          "NIST SP 800-38A": 4,
          "NIST SP 800-38B": 1,
          "NIST SP 800-38C": 1,
          "NIST SP 800-38D": 2,
          "NIST SP 800-67": 4,
          "NIST SP 800-90A": 3,
          "SP 800-38A": 1,
          "SP 800-38D": 2
        },
        "PKCS": {
          "PKCS #1": 8,
          "PKCS#1": 4
        },
        "RFC": {
          "RFC 7748": 4,
          "RFC 8032": 7
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 61
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDEA": 2,
            "TDES": 28,
            "Triple-DES": 22
          },
          "DES": {
            "DES": 16
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 10,
            "CMAC": 9,
            "HMAC": 27
          }
        },
        "miscellaneous": {
          "SM4": {
            "SM4": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 172,
          "NXP Semiconductors": 32
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP B.V.",
      "/CreationDate": "D:20210806081218+02\u002700\u0027",
      "/Creator": "DITA Open Toolkit",
      "/Keywords": "NXP, SN200 Series, SN200x Single Chip Secure Element and NFC Controller,\n    Crypto Library, Common Criteria, Security Target Lite",
      "/Producer": "Apache FOP Version 1.1",
      "/Subject": "SN200 Series - Secure Element with Crypto Library",
      "/Title": "Security Target Lite",
      "pdf_file_size_bytes": 670271,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 99
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf",
        "pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2200037-01-CR%20.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ASE_TSS.2",
      "EAL6+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2200037-01-STLite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4642bd43ad5bcac052e0989473ba7e9a41dd6a01ae4bdc3d927a327f4a5d701e",
      "txt_hash": "eb08a0033329b8bff03863115af556802fe5df9abae0a54b698f2bbf68790484"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "307722fb17501da84c124f811aba393cfe07cd5764bf0b51cd09fe0652379fdc",
      "txt_hash": "84f38e2625f4199c1d74afd25a13b5dfc3e8accb6d06b839ee59f3c643365135"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ca60b8bdfa7006540ce29c7061515d507269bd15e92a15b020fe551d7726f93c",
      "txt_hash": "56dc30fb938ea5f8158707b08c97ceb426175087fcbce010430d3026bc0c8a08"
    }
  },
  "status": "active"
}