JCOP4 P71

Certificate #3746

Webpage information

Status historical
Historical reason Moved to historical list due to sunsetting
Validation dates 23.11.2020 , 07.10.2024
Standard FIPS 140-2
Security level 3
Type Hardware
Embodiment Single Chip
Caveat None
Exceptions
  • Physical Security: Level 4
Description NXP Semiconductors offers JCOP, a secure Java Card Operating System based on several independent 3rd party specifications, such as Java Card 3.0.5 specifications, the GlobalPlatform card specifications, and a few International Organization for Standards (like ISO7816), EMV (Europay, Mastercard and VISA) and others. By adhering to these standards, JCOP4 P71 ensures large interoperability with third-party applets providers, card issuers as well as all existing Smart Card infrastructures.
Version (Hardware) [P71D321 (N7121 B1)]
Version (Firmware) [Platform ID 4A335233353130323336333130343030DCE5C19CFE6D0DCF and ROM ID 2E5AD88409C9BADB and Patch ID 1 and FIPS Applet 1.0 (RC2)]
Vendor NXP Semiconductors
References

This certificate's webpage directly references 0 certificates, transitively this expands into 0 certificates.

Security policy

Symmetric Algorithms
AES, AES-128, AES-, AES-256, RC2, DES, TDEA, Triple-DES, CMAC
Asymmetric Algorithms
ECDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-256, SHA-512, SHA-384
Schemes
MAC
Randomness
DRBG, RNG
Elliptic Curves
P-224, P-256, P-521, P-384
Block cipher modes
ECB, CBC

JavaCard versions
Java Card 3.0.5
Operating System name
JCOP4
Vendor
NXP Semiconductors

Security level
Level 3
Side-channel analysis
DPA, SPA, Fault Induction

Standards
FIPS 140-2, FIPS140-2, FIPS PUB 140-2, FIPS 180-4, FIPS 186-4, SP 800-38F, SP 800-56A, SP 800-90A, PKCS#1, PKCS #1, SCP03

File metadata

Title JCOP4 P71 Security Policy
Subject FIPS 140-2 Security Policy
Author Sylvain Bonfardin
Creation date D:20201026151046-07'00'
Modification date D:20201026151058-07'00'
Pages 19
Creator Acrobat PDFMaker 17 for Word
Producer Adobe PDF Library 15.0

Heuristics

No heuristics are available for this certificate.

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.fips.FIPSCertificate",
  "cert_id": 3746,
  "dgst": "2358a16af9f6bd7c",
  "heuristics": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.Heuristics",
    "algorithms": {
      "_type": "Set",
      "elements": [
        "KBKDF#C1289",
        "KTS#C880",
        "SHS#C837",
        "RSA#C888",
        "ECDSA#C887",
        "Triple-DES#C880",
        "CVL#C887",
        "DRBG#C886",
        "AES#C880",
        "RSA#C838"
      ]
    },
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "module_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "module_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "policy_processed_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "policy_prunned_references": {
      "_type": "Set",
      "elements": []
    },
    "related_cves": null,
    "verified_cpe_matches": null
  },
  "pdf_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.PdfData",
    "keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 12
          },
          "ECDSA": {
            "ECDSA": 14
          }
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "P-224": 12,
          "P-256": 14,
          "P-384": 10,
          "P-521": 16
        }
      },
      "eval_facility": {},
      "fips_cert_id": {
        "Cert": {
          "#1": 1
        }
      },
      "fips_certlike": {
        "Certlike": {
          "AES (128": 1,
          "AES CMAC [197": 1,
          "AES [197": 1,
          "AES- 192": 4,
          "AES- 256": 1,
          "AES-128": 11,
          "AES-128/192/256": 1,
          "AES-256": 7,
          "PKCS #1": 2,
          "PKCS#1": 2,
          "SHA- 384": 2,
          "SHA- 512": 2,
          "SHA-( 12": 1,
          "SHA-(224": 1,
          "SHA-1": 2,
          "SHA-224": 4,
          "SHA-256": 8,
          "SHA-384": 6,
          "SHA-512": 8
        }
      },
      "fips_security_level": {
        "Level": {
          "Level 3": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-224": 4,
            "SHA-256": 8,
            "SHA-384": 6,
            "SHA-512": 8
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.5": 3
        }
      },
      "os_name": {
        "JCOP": {
          "JCOP4": 25
        }
      },
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 8
        },
        "RNG": {
          "RNG": 4
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Fault Induction": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 2
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140-2": 25,
          "FIPS 180-4": 1,
          "FIPS 186-4": 2,
          "FIPS PUB 140-2": 2,
          "FIPS140-2": 1
        },
        "NIST": {
          "SP 800-38F": 1,
          "SP 800-56A": 2,
          "SP 800-90A": 1
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 1
        },
        "SCP": {
          "SCP03": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 21,
            "AES-": 6,
            "AES-128": 11,
            "AES-256": 7
          },
          "RC": {
            "RC2": 2
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "Triple-DES": 7
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 7
          }
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP Semiconductors": 41
        }
      },
      "vulnerability": {}
    },
    "policy_metadata": {
      "/\u003cDocument_Version\u003e": "1.1",
      "/\u003cEdit_Year\u003e": "2020",
      "/\u003cModule_name\u003e": "JCOP4 P71",
      "/\u003cVendor_Name\u003e": "NXP Semiconductors",
      "/Author": "Sylvain Bonfardin",
      "/Company": "NXP / UL",
      "/CreationDate": "D:20201026151046-07\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 for Word",
      "/ModDate": "D:20201026151058-07\u002700\u0027",
      "/Producer": "Adobe PDF Library 15.0",
      "/SourceModified": "D:20201026220940",
      "/Subject": "FIPS 140-2 Security Policy ",
      "/Title": "JCOP4 P71 Security Policy",
      "pdf_file_size_bytes": 393969,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=31283",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=31276",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=31234",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=31284",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=31695",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=31282",
          "https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=31233"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 19
    }
  },
  "state": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.InternalState",
    "module_download_ok": true,
    "module_extract_ok": true,
    "policy_convert_ok": true,
    "policy_download_ok": true,
    "policy_extract_ok": true,
    "policy_json_hash": null,
    "policy_pdf_hash": "3748ae80e8106c6fbb69cdfc1a47ad8ebcd28ee3875f3916343d014638c72d8b",
    "policy_txt_hash": "6540e0b6f12533f7747fae7a9ccd8a3e0dbc0ef2c9459b3a3b50c539cdb44133"
  },
  "web_data": {
    "_type": "sec_certs.sample.fips.FIPSCertificate.WebData",
    "caveat": "None",
    "certificate_pdf_url": "https://csrc.nist.gov/CSRC/media/projects/cryptographic-module-validation-program/documents/certificates/November 2020_011220_0856_signed.pdf",
    "date_sunset": null,
    "description": "NXP Semiconductors offers JCOP, a secure Java Card Operating System based on several independent 3rd party specifications, such as Java Card 3.0.5 specifications, the GlobalPlatform card specifications, and a few International Organization for Standards (like ISO7816), EMV (Europay, Mastercard and VISA) and others. By adhering to these standards, JCOP4 P71 ensures large interoperability with third-party applets providers, card issuers as well as all existing Smart Card infrastructures.",
    "embodiment": "Single Chip",
    "exceptions": [
      "Physical Security: Level 4"
    ],
    "fw_versions": "[Platform ID 4A335233353130323336333130343030DCE5C19CFE6D0DCF and ROM ID 2E5AD88409C9BADB and Patch ID 1 and FIPS Applet 1.0 (RC2)]",
    "historical_reason": "Moved to historical list due to sunsetting",
    "hw_versions": "[P71D321 (N7121 B1)]",
    "level": 3,
    "mentioned_certs": {},
    "module_name": "JCOP4 P71",
    "module_type": "Hardware",
    "revoked_link": null,
    "revoked_reason": null,
    "standard": "FIPS 140-2",
    "status": "historical",
    "sw_versions": null,
    "tested_conf": null,
    "validation_history": [
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2020-11-23",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Initial"
      },
      {
        "_type": "sec_certs.sample.fips.FIPSCertificate.ValidationHistoryEntry",
        "date": "2024-10-07",
        "lab": "UL Verification Services, Inc.",
        "validation_type": "Update"
      }
    ],
    "vendor": "NXP Semiconductors",
    "vendor_url": "http://www.nxp.com"
  }
}