NXP SmartePP on P71, version 03 00 00 10

CSV information ?

Status active
Valid from 12.05.2021
Valid until 12.05.2026
Scheme 🇳🇱 NL
Manufacturer NXP Semiconductors Germany GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_FLR.1, EAL4+, ALC_DVS.2

Heuristics summary ?

Certificate ID: NSCIB-CC-0108259-CR

Certificate ?

Certification report ?

Extracted keywords

Protocols
PACE
Libraries
Crypto Library 0.7.6

Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL4+, EAL 4, EAL4 augmented, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1
Protection profiles
BSI-CC-PP-0055-2009
Certificates
BSI-DSZ-CC-1136-2021, NSCIB-CC-0108259-CR
Evaluation facilities
Riscure

Side-channel analysis
JIL-AM, JIL-AAPS, JIL, JHAS

Standards
ICAO

File metadata

Creation date: D:20210512105237+02'00'
Modification date: D:20210512105237+02'00'
Pages: 11
Producer: Foxit Reader PDF Printer Version 7.1.0.112

Frontpage

Certificate ID: NSCIB-CC-0108259-CR
Certified item: NXP SmartePP on P71, version 03 00 00 10
Certification lab: Riscure B.V
Developer: NXP Semiconductors Germany GmbH

References

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES, KMAC
Asymmetric Algorithms
RSA 1024, ECDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-256
Schemes
MAC
Randomness
RNG
Block cipher modes
ECB, CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG15, EF.COM, EF.SOD
Trusted Execution Environments
SSC
Vendor
NXP, NXP Semiconductors

Security level
EAL 4+, EAL 6+, EAL 4, EAL4, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_CKM.4.1, FCS_RND.1, FCS_RNG, FCS_CKM.1, FCS_CKM.4, FCS_COP, FCS_COP.1, FCS_RND.1.1, FCS_CKM, FDP_UIT.1, FDP_ITC.1, FDP_ITC.2, FDP_ITC, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FDP_ACF.1.2, FDP_ACF.1.4, FIA_API, FIA_API.1, FIA_API.1.1, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_ACC.1, FIA_ACF.1, FIA_UCT.1, FIA_AFL.1, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FMT_MTD.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3
Protection profiles
BSI-CC-PP-0055-2009, BSI-CC-PP-0055, BSI-CC-PP0035-2007, BSI-CC-PP0055, BSI-CC-PP0056, BSI-PP-CC-0055, BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1136-2021

Side-channel analysis
Physical Tampering, physical tampering, Malfunction, malfunction

Standards
FIPS 180-4, FIPS 197, AIS31, ISO/IEC 14443, ISO/IEC 7816, ISO/IEC 9796-2, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: Security Target Lite
Subject: NXP SmartePP_P71 - ICAO BAC with optional Active Authentication
Keywords: Security Target, ICAO, Basic Access Control (BAC)
Author: NXP B.V.
Creation date: D:20210302092602Z
Modification date: D:20210302092708Z
Pages: 36
Creator: DITA Open Toolkit 2.5.4
Producer: Apache FOP Version 1.1

References

Heuristics ?

Certificate ID: NSCIB-CC-0108259-CR

Extracted SARs

ASE_TSS.2, ALC_FLR.1, ALC_DVS.2

References ?

No references are available for this certificate.

Updates ?

  • 21.10.2022 The certificate became unavailable, either the certification report or the security target was unavailable during processing.
    Certificate removed

    A Common Criteria certificate for a product named NXP SmartePP on P71, version 03 00 00 10 is not available. This means that either its certification report or security target could not be downloaded during processing.

  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'NSCIB-CC-0108259-Certification Report(BAC).pdf', 'st_filename': 'smart_ePP_BAC_Lite_v1.3_20210302.pdf'}.
    • The report_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.1': 2}}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 9}}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 6+': 2}}}}, 'cc_sfr': {'__update__': {'FCS': {'__insert__': {'FCS_COP': 65, 'FCS_COP.1': 3, 'FCS_CKM': 1}, '__update__': {'FCS_RND.1': 18}}, 'FDP': {'__insert__': {'FDP_ITC': 1}}, 'FIA': {'__insert__': {'FIA_UAU': 1}, '__update__': {'FIA_API': 7, 'FIA_UAU.5': 16}}, 'FMT': {'__insert__': {'FMT_MTD': 33}, '__update__': {'FMT_SMF.1': 9, 'FMT_SMR.1': 12, 'FMT_MTD.1': 2}}, 'FPT': {'__update__': {'FPT_FLS.1': 4}}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP': 92, 'NXP Semiconductors': 27}}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}}}}}, 'asymmetric_crypto': {'__delete__': ['FF']}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 7}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 2}}}}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'Malfunction': 1}}}}, 'ic_data_group': {'__update__': {'EF': {'__update__': {'EF.DG15': 4}}}}, 'standard_id': {'__update__': {'FIPS': {'__delete__': ['FIPS 180-2', 'FIPS 46-3']}, 'ICAO': {'__update__': {'ICAO': 50}}}}} data.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 299864, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 36, '/Author': 'NXP B.V.', '/CreationDate': 'D:20210302092602Z', '/Creator': 'DITA Open Toolkit 2.5.4', '/Keywords': 'Security Target, ICAO, Basic Access Control (BAC)', '/ModDate': 'D:20210302092708Z', '/PDFVersion': '1.4', '/Producer': 'Apache FOP Version 1.1', '/Subject': 'NXP SmartePP_P71 - ICAO BAC with optional Active Authentication', '/Title': 'Security Target Lite', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/af69743d07b1ed04.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/af69743d07b1ed04.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1136-2021': 2}, 'NL': {'NSCIB-CC-0108259-CR': 33}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4+': 1, 'EAL 4': 1, 'EAL4 augmented': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 2, 'ALC_FLR.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 18, 'NXP Semiconductors': 4}}, 'eval_facility': {'Riscure': {'Riscure': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library 0.7.6': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL-AM': 2, 'JIL-AAPS': 2, 'JIL': 2, 'JHAS': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 10}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1136-2021': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055-2009': 2, 'BSI-CC-PP-0055': 3, 'BSI-CC-PP0035-2007': 1, 'BSI-CC-PP0055': 6, 'BSI-CC-PP0056': 1, 'BSI-PP-CC-0055': 1, 'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 4+': 1, 'EAL 6+': 1, 'EAL 4': 1, 'EAL4': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 2, 'ALC_FLR.1': 3}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4, 'FAU_SAS': 1, 'FAU_CKM.4.1': 1}, 'FCS': {'FCS_RND.1': 19, 'FCS_RNG': 1, 'FCS_CKM.1': 14, 'FCS_CKM.4': 20, 'FCS_RND.1.1': 1}, 'FDP': {'FDP_UIT.1': 8, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_ACC.1': 5, 'FDP_ACF.1': 5, 'FDP_UCT.1': 7, 'FDP_ACF.1.2': 4, 'FDP_ACF.1.4': 3}, 'FIA': {'FIA_API': 6, 'FIA_API.1': 12, 'FIA_API.1.1': 1, 'FIA_UID.1': 8, 'FIA_UAU.1': 12, 'FIA_UAU.4': 12, 'FIA_UAU.5': 15, 'FIA_UAU.6': 5, 'FIA_ACC.1': 1, 'FIA_ACF.1': 1, 'FIA_UCT.1': 1, 'FIA_AFL.1': 9, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 3, 'FMT_LIM': 1, 'FMT_SMF.1': 10, 'FMT_SMR.1': 13, 'FMT_MTD.1': 1}, 'FPT': {'FPT_FLS.1': 5, 'FPT_TST.1': 12, 'FPT_PHP.3': 5}}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 96, 'NXP Semiconductors': 58}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'DES': {'DES': 13}, '3DES': {'Triple-DES': 5, 'TDES': 6}}, 'constructions': {'MAC': {'KMAC': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}, 'ECC': {'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 1}}, 'FF': {'DSA': {'DSA': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 2, 'SHA-256': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 16}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 3}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'Physical Tampering': 2, 'physical tampering': 1, 'Malfunction': 5, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 8, 'EF.DG2': 3, 'EF.DG3': 3, 'EF.DG4': 3, 'EF.DG5': 3, 'EF.DG16': 8, 'EF.DG15': 3, 'EF.COM': 5, 'EF.SOD': 5}}, 'standard_id': {'FIPS': {'FIPS 180-4': 1, 'FIPS 180-2': 1, 'FIPS 46-3': 1, 'FIPS 197': 1}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 14443': 2, 'ISO/IEC 7816': 2, 'ISO/IEC 9796-2': 1}, 'ICAO': {'ICAO': 53}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '47e22fa3e181e82607ba5fdeb448cf0c6e7e4c11c7b930ca0a57b70349830646', 'st_pdf_hash': '5746b1ca875b5a62d1551f38101b82f1f28733d1b2c14f6e84d046f636c1f84d', 'report_txt_hash': '8fb6b72cfdf768fd6ede2f1286c77bde13e107345d19da69e12f195fb92ea044', 'st_txt_hash': 'fb598f11dfed8c48c5d7456a02b3b26769d320762ff45370b1515f1d54dc80f3'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'PACE': 2}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 3, 'DES': 7, 'TDES': 6, 'KMAC': 1}, 'rules_asymmetric_crypto': {'RSA 1024': 1, 'ECDSA': 3, 'ECC': 1, 'DSA': 3}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 4, 'SHA-224': 2, 'SHA-256': 2}, 'rules_crypto_schemes': {'MAC': 16}, 'rules_randomness': {'RNG': 3}, 'rules_tee': {'SSC': 1}, 'rules_side_channels': {'Malfunction': 5, 'malfunction': 1, 'Physical Tampering': 2, 'physical tampering': 1}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-2021']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-2021']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-2021']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1136-2021']}}}.
    • The cert_lab property was set to [''].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {'cert_id': 'NSCIB-CC-0108259-CR', 'cert_item': 'NXP SmartePP on P71, version 03 00 00 10', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': ' Riscure B.V'}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['03', '10', '00']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP SmartePP on P71, version 03 00 00 10 was processed.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB%20certificate%20CC-21-0108259.pdf",
  "dgst": "af69743d07b1ed04",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "NSCIB-CC-0108259-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "10",
        "00",
        "03"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021"
        ]
      }
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP SmartePP on P71, version 03 00 00 10",
  "not_valid_after": "2026-05-12",
  "not_valid_before": "2021-05-12",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "NSCIB-CC-0108259-Certification Report(BAC).pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {
        "cert_id": "NSCIB-CC-0108259-CR",
        "cert_item": "NXP SmartePP on P71, version 03 00 00 10",
        "cert_lab": " Riscure B.V",
        "developer": "NXP Semiconductors Germany GmbH"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-2021": 2
        },
        "NL": {
          "NSCIB-CC-0108259-CR": 33
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055-2009": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 2,
          "ALC_FLR.1": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 2,
          "EAL4 augmented": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library 0.7.6": 1
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Riscure": {
          "Riscure": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JHAS": 1,
          "JIL": 2,
          "JIL-AAPS": 2,
          "JIL-AM": 2
        }
      },
      "standard_id": {
        "ICAO": {
          "ICAO": 9
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 18,
          "NXP Semiconductors": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20210512105237+02\u002700\u0027",
      "/Creator": "",
      "/Keywords": "",
      "/ModDate": "D:20210512105237+02\u002700\u0027",
      "/Producer": "Foxit Reader PDF Printer Version 7.1.0.112",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 179566,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 11
    },
    "st_filename": "smart_ePP_BAC_Lite_v1.3_20210302.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 3
          }
        },
        "RSA": {
          "RSA 1024": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-2021": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 3,
          "BSI-CC-PP-0055-2009": 2,
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP0035-2007": 1,
          "BSI-CC-PP0055": 6,
          "BSI-CC-PP0056": 1,
          "BSI-PP-CC-0055": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 2,
          "ALC_FLR.1": 3
        },
        "ASE": {
          "ASE_TSS.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 4+": 1,
          "EAL 6+": 2,
          "EAL4": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_CKM.4.1": 1,
          "FAU_SAS": 1,
          "FAU_SAS.1": 4
        },
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 14,
          "FCS_CKM.4": 20,
          "FCS_COP": 65,
          "FCS_COP.1": 3,
          "FCS_RND.1": 18,
          "FCS_RND.1.1": 1,
          "FCS_RNG": 1
        },
        "FDP": {
          "FDP_ACC.1": 5,
          "FDP_ACF.1": 5,
          "FDP_ACF.1.2": 4,
          "FDP_ACF.1.4": 3,
          "FDP_ITC": 1,
          "FDP_ITC.1": 6,
          "FDP_ITC.2": 6,
          "FDP_UCT.1": 7,
          "FDP_UIT.1": 8
        },
        "FIA": {
          "FIA_ACC.1": 1,
          "FIA_ACF.1": 1,
          "FIA_AFL.1": 9,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 7,
          "FIA_API.1": 12,
          "FIA_API.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 12,
          "FIA_UAU.4": 12,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 16,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 5,
          "FIA_UCT.1": 1,
          "FIA_UID.1": 8
        },
        "FMT": {
          "FMT_LIM": 1,
          "FMT_LIM.1": 3,
          "FMT_LIM.2": 3,
          "FMT_MTD": 33,
          "FMT_MTD.1": 2,
          "FMT_SMF.1": 9,
          "FMT_SMR.1": 12
        },
        "FPT": {
          "FPT_FLS.1": 4,
          "FPT_PHP.3": 5,
          "FPT_TST.1": 12
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 2
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 5,
          "EF.DG1": 8,
          "EF.DG15": 4,
          "EF.DG16": 8,
          "EF.DG2": 3,
          "EF.DG3": 3,
          "EF.DG4": 3,
          "EF.DG5": 3,
          "EF.SOD": 5
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "Physical Tampering": 2,
          "malfunction": 1,
          "physical tampering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 197": 1
        },
        "ICAO": {
          "ICAO": 50
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816": 2,
          "ISO/IEC 9796-2": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "TDES": 6,
            "Triple-DES": 5
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "KMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SSC": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 92,
          "NXP Semiconductors": 27
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP B.V.",
      "/CreationDate": "D:20210302092602Z",
      "/Creator": "DITA Open Toolkit 2.5.4",
      "/Keywords": "Security Target, ICAO, Basic Access Control (BAC)",
      "/ModDate": "D:20210302092708Z",
      "/PDFVersion": "1.4",
      "/Producer": "Apache FOP Version 1.1",
      "/Subject": "NXP SmartePP_P71 - ICAO BAC with optional Active Authentication",
      "/Title": "Security Target Lite",
      "pdf_file_size_bytes": 299864,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 36
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf",
        "pp_name": "Protection Profile for Machine Readable Travel Document with \u0027ICAO Application\u0027, Basic Acce..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0108259-Certification%20Report(BAC).pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2",
      "ALC_FLR.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/smart_ePP_BAC_Lite_v1.3_20210302.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "47e22fa3e181e82607ba5fdeb448cf0c6e7e4c11c7b930ca0a57b70349830646",
    "report_txt_hash": "8fb6b72cfdf768fd6ede2f1286c77bde13e107345d19da69e12f195fb92ea044",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "5746b1ca875b5a62d1551f38101b82f1f28733d1b2c14f6e84d046f636c1f84d",
    "st_txt_hash": "fb598f11dfed8c48c5d7456a02b3b26769d320762ff45370b1515f1d54dc80f3"
  },
  "status": "active"
}