MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB)

CSV information ?

Status archived
Valid from 30.04.2018
Valid until 30.04.2023
Scheme 🇩🇪 DE
Manufacturer MaskTech International GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL5+, ALC_DVS.2
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0995-2018

Certificate ?

Extracted keywords

Protocols
PACE

Security level
EAL 5, EAL 2, EAL 5 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Certificates
BSI-DSZ-CC-0995-2018

Standards
ISO/IEC 15408, ISO/IEC 18045, ICAO

File metadata

Title: Certificate BSI-DSZ-CC-0995-2018
Subject: MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB)
Keywords: "Common Criteria, Certification, Zertifizierung, MRTD, EAC with PACE"
Author: Bundesamt fĂĽr Sicherheit in der Informationstechnik
Creation date: D:20180504104251+02'00'
Modification date: D:20180524121743+02'00'
Pages: 1
Creator: Writer
Producer: LibreOffice 5.2

Certification report ?

Extracted keywords

Symmetric Algorithms
AES-128, AES, DES, 3DES
Asymmetric Algorithms
ECC, Diffie-Hellman, DSA
Hash functions
SHA-2
Schemes
MAC, Key Exchange
Protocols
PACE, PGP
Randomness
RNG
Engines
SmartMX2

Vendor
NXP Semiconductors, NXP, Gemalto

Security level
EAL 5, EAL 2, EAL 1, EAL 4, EAL5+, EAL6, EAL 5+, EAL 6, EAL 5 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_COMP.1, ATE_IND, AVA_VAN.5, AVA_VAN
Protection profiles
BSI-CC-PP-0056-V2-2012-MA-, BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0056-V2-, BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-
Certificates
BSI-DSZ-CC-0995-2018, BSI-DSZ-CC-0996-2018, BSI-DSZ-CC-1001-, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-S-0073-2016, BSI-DSZ-CC-S-0064-2016, CC-17-67206, CC-67206-CR2
Evaluation facilities
Brightsight, TĂśV Informationstechnik, SRC Security Research & Consulting
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Application”, MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), MaskTech International GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0995-2018, Version 1.1, 16.02.2018, Security Target – Machine, - MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile Machine Readable Travel Document with "ICAO Application", Extended Access, 2.5 EAC with PACE / P60D145VB_J (P6022y VB), MaskTech International GmbH, Version 0.3, 16.02.2018 (confidential document) [12] MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) User Guidance, MaskTech International, VB, Certification ID BSI-DSZ-CC-0973-V2, version 1, 25.08.2016, TÜV Informationstechnik GmbH (confidential document) [17] Certification Report Crypto Library V3.1.x on P6022y VB, Report number NSCIB- CC-67206-CR2, 11.2017, TÜV Rheinland Nederland B.V. (confidential document) [18] ETR for Composite Evaluation Crypto Library V3.1.x on P6022y VB EAL6+/5+, Certification ID, Reference 17-RPT-421, version 3.0, 24.10.2017, Brightsight B.V., (confidential document) [19] Product data sheet, Secure high-performace smart card controller, SmartMX2 family P6022y VB

Side-channel analysis
side channel, fault injection, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Application”, MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), MaskTech International GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0995-2018, Version 1.1, 16.02.2018, Security Target – Machine, - MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile Machine Readable Travel Document with "ICAO Application", Extended Access, 2.5 EAC with PACE / P60D145VB_J (P6022y VB), MaskTech International GmbH, Version 0.3, 16.02.2018 (confidential document) [12] MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) User Guidance, MaskTech International, VB, Certification ID BSI-DSZ-CC-0973-V2, version 1, 25.08.2016, TÜV Informationstechnik GmbH (confidential document) [17] Certification Report Crypto Library V3.1.x on P6022y VB, Report number NSCIB- CC-67206-CR2, 11.2017, TÜV Rheinland Nederland B.V. (confidential document) [18] ETR for Composite Evaluation Crypto Library V3.1.x on P6022y VB EAL6+/5+, Certification ID, Reference 17-RPT-421, version 3.0, 24.10.2017, Brightsight B.V., (confidential document) [19] Product data sheet, Secure high-performace smart card controller, SmartMX2 family P6022y VB

Standards
AIS 34, AIS 36, AIS 25, AIS 31, AIS 35, AIS 20, AIS 26, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ICAO
Technical reports
BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-0995-2018
Subject: MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB)
Keywords: "Common Criteria, Certification, Zertifizierung, MRTD, EAC with PACE"
Author: Bundesamt fĂĽr Sicherheit in der Informationstechnik
Creation date: D:20180504104224+02'00'
Modification date: D:20180504111206+02'00'
Pages: 29
Creator: Writer
Producer: LibreOffice 5.2

Frontpage

Certificate ID: BSI-DSZ-CC-0995-2018
Certified item: MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB
Certification lab: BSI
Developer: MaskTech International GmbH

References

Outgoing
  • BSI-DSZ-CC-0996-2018 - MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC)
  • BSI-DSZ-CC-0973-V2-2016 - NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, Triple-DES, TDES, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2
Schemes
MAC, Key Agreement
Protocols
PACE
Randomness
RNG, RND
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG15, EF.DG13, EF.COM, EF.SOD
Trusted Execution Environments
SSC
Vendor
NXP Semiconductors, Gemalto

Security level
EAL5, EAL4, EAL5 augmented
Claims
O.EEPROM_INTEGRITY, O.TDES, O.SW_DES, O.AES, O.SW_AES, O.RSA, O.ECDSA, O.ECC_DHKE, O.SHA, O.MEM_ACCESS, O.SFR_ACCESS, O.RND, O.CUST_RECONFIG_PLAIN, O.FM_FW, O.PUF, O.COPY, O.COMPARE, O.REUSE, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.5, ADV_INT.2, ADV_TDS.4, AGD_PRE.1, AGD_OPE.1, ALC_DVS.2, ALC_DEL.1, ALC_CMC.4, ALC_CMS.5, ALC_LCD.1, ALC_TAT.2, ALC_FLR.1, ATE_DPT.2, ATE_DPT.3, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_COP, FCS_CKM, FCS_RND.1, FCS_RNG.1, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FCS_RND.1.1, FCS_RND.1.2, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC, FDP_ACF.1, FDP_ACF, FDP_UCT, FDP_UIT, FDP_RIP.1.1, FDP_UCT.1, FDP_IFC.1, FDP_UIT.1, FDP_ITC, FDP_ITT.1, FDP_SDC.1, FDP_SDI.2, FDP_SOP.1, FIA_API, FIA_UID, FIA_UAU, FIA_API.1, FIA_AFL, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.6, FIA_API.1.1, FIA_AFL.1, FIA_ACC.1.1, FMT_MTD, FMT_MSA.3, FMT_MTD.3, FMT_SMR, FMT_SMR.1, FMT_SMF.1, FMT_SMF.1.1, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD.1, FMT_MTD.3.1, FMT_MSA.1, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1, FTP_ITC
Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0068-V2, BSI-CC-PP-0056-, BSI-CC-PP-0055, BSI-CC-PP-0056-V2, BSI-CC-PP-0056-V2-2011, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0055-2009
Certificates
BSI-DSZ-CC-0995, BSI-DSZ-CC-1001, BSI-DSZ-CC-S-0064-2016, BSI-DSZ-CC-S-0073-2016, BSI-DSZ-CC-S-0097-2017, CC-17-67206, NSCIB-CC-15-67206-CR2

Side-channel analysis
Leak-Inherent, physical probing, DPA, Physical tampering, physical tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS 180-4, FIPS 140-2, FIPS PUB 140-2, FIPS PUB 180-4, FIPS PUB 186-4, FIPS PUB 197, FIPS PUB 46-3, PKCS #1, PKCS #3, AIS 31, RFC 2631, RFC 3369, ISO/IEC 7816, ISO/IEC 15946-3, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 7816:2008, ISO/IEC 9797:1999, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004
Technical reports
BSI TR-03110

File metadata

Title: MTCOS Pro 2.5 ICAO - EAC with PACE / P60D145VB_J (P6022y VB) - Security Target lite
Subject: Common Criteria Certification
Keywords: Common Criteria, CC, Machine Readable Travel Document, MRTD, EAC with PACE, ePass, MTCOS, EAL 5+
Author: MaskTech International GmbH
Creation date: D:20180222124104+01'00'
Modification date: D:20180427095219+02'00'
Pages: 115
Creator: LaTeX with hyperref package
Producer: pdfTeX-1.40.15

References

Outgoing
Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-0995-2018

Extracted SARs

ASE_SPD.1, ADV_TDS.4, AGD_PRE.1, ALC_DVS.2, ASE_ECD.1, ALC_CMC.4, ALC_LCD.1, ADV_FSP.5, ASE_TSS.2, ALC_TAT.2, ADV_ARC.1, ASE_REQ.2, ALC_DEL.1, ATE_COV.2, ASE_CCL.1, ASE_INT.1, AGD_OPE.1, ATE_DPT.3, ATE_FUN.1, ADV_IMP.1, ALC_COMP.1, AVA_VAN.5, ATE_IND.2, ALC_FLR.1, ASE_OBJ.2, ALC_CMS.5, ADV_INT.2

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'fc4bbb40be46caf5dffde0c7fba7c70b20a43d980cb85a3e983b4ef92872c859', 'txt_hash': 'a25b9f07c7fc589cf5c54b096c7fee3a958ca26692ff437817ae46535b571ec7'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4cae51e22c9795b181c646d66e88668744e3a0bab33014eecad6065a98c38ae1', 'txt_hash': '20f6a17d54f9ec186625fc28fd61d33076b3fa9dc7e32b9dc344718e14e2bcab'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '01b740642da33136041ecda53090e97de3ec48f125b37931e52f667b08997069', 'txt_hash': '8b9c8d397c4303ccd02b6f11d4d11f2f7e919289cce08b292c39fde1fcc993e2'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 364943, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/CreationDate': "D:20180504104251+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, MRTD, EAC with PACE"', '/ModDate': "D:20180524121743+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB)', '/Title': 'Certificate BSI-DSZ-CC-0995-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0995-2018': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 5': 2, 'EAL 2': 1, 'EAL 5 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 2}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}, 'ICAO': {'ICAO': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '0995c_pdf.pdf'}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0995-2018', 'cert_item': 'MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB', 'developer': 'MaskTech International GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Machine Readable Travel Document with "ICAO Application", Extended Access Control with PACE (EAC PP), Version 1.3.2, 5 December 2012, BSI- CC-PP-0056-V2-2012-MA-02', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-17-67206': 3, 'CC-67206-CR2': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1001-': 1, 'BSI-DSZ-CC-S-0073-2016': 1, 'BSI-DSZ-CC-S-0064-2016': 1}, '__update__': {'BSI-DSZ-CC-0995-2018': 18, 'BSI-DSZ-CC-0996-2018': 2, 'BSI-DSZ-CC-0973-V2-2016': 1}, '__delete__': ['BSI-DSZ-CC-0973-V2']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'BSI-DSZ-CC-0995': 1, 'BSI-DSZ-CC-1001': 1, 'BSI-DSZ-CC-S-0064-2016': 1, 'BSI-DSZ-CC-S-0073-2016': 1, 'BSI-DSZ-CC-S-0097-2017': 1}, 'NL': {'__insert__': {'CC-17-67206': 1}, '__update__': {'NSCIB-CC-15-67206-CR2': 1}}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0973-V2': 9}, '__update__': {'BSI-DSZ-CC-0995-2018': 36, 'BSI-DSZ-CC-0996-2018': 4, 'BSI-DSZ-CC-0973-V2-2016': 2}, '__delete__': ['BSI-DSZ-CC-1001-', 'BSI-DSZ-CC-S-0073-2016', 'BSI-DSZ-CC-S-0064-2016']}}, '__delete__': ['NL']}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'BSI-DSZ-CC-0973-V2': 6}, 'NL': {'__update__': {'NSCIB-CC-15-67206-CR2': 3}, '__delete__': ['CC-17-67206']}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'NL': {'CC-17-67206': 3, 'CC-67206-CR2': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1001-': 1, 'BSI-DSZ-CC-S-0073-2016': 1, 'BSI-DSZ-CC-S-0064-2016': 1}, '__update__': {'BSI-DSZ-CC-0995-2018': 18, 'BSI-DSZ-CC-0996-2018': 2, 'BSI-DSZ-CC-0973-V2-2016': 1}, '__delete__': ['BSI-DSZ-CC-0973-V2']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'BSI-DSZ-CC-0995': 1, 'BSI-DSZ-CC-1001': 1, 'BSI-DSZ-CC-S-0064-2016': 1, 'BSI-DSZ-CC-S-0073-2016': 1, 'BSI-DSZ-CC-S-0097-2017': 1}, 'NL': {'__insert__': {'CC-17-67206': 1}, '__update__': {'NSCIB-CC-15-67206-CR2': 1}}}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1211-2023', 'BSI-DSZ-CC-1147-V3-2023', 'BSI-DSZ-CC-1148-V3-2023']}}} data.
  • 18.05.2023 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'BSI-DSZ-CC-1001-2018', 'product': 'MTCOS Pro 2.5 SSCD / P60D145VB_J (P6022y VB)', 'vendor': 'MaskTech International GmbH', 'certification_date': '30.04.2018', 'category': 'Digital signature', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitale_Signatur-Sichere_Signaturerstellungseinheiten/1001.html', 'enhanced': {'product': 'MTCOS Pro 2.5 SSCD / P60D145VB_J (P6022y VB)', 'applicant': 'MaskTech International GmbH\nNordostpark 45 \n90411 NĂĽrnberg', 'evaluation_facility': 'SRC Security Research & Consulting GmbH', 'assurance_level': 'EAL5+,ALC_DVS.2,AVA_VAN.5', 'protection_profile': 'EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation, 18 May 2013, BSI-CC-PP-0059-2009-MA-02, Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application, CEN / ISSS - Information Society \nStandardization System, 12 October 2013, BSI-CC-PP-0071-2012-MA-01, Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application, CEN / ISSS - Information Society Standardization System, 12 October 2013, BSI-CC-PP-0072-2012-MA-01', 'certification_date': '30.04.2018', 'expiration_date': '29.04.2023', 'entries': [{'id': 'EN'}, {'id': 'Protection'}, {'id': 'Protection'}], 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1001a_pdf.pdf?__blob=publicationFile&v=1', 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1001b_pdf.pdf?__blob=publicationFile&v=1', 'cert_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1001c_pdf.pdf?__blob=publicationFile&v=1', 'description': 'The target of evaluation (TOE) is the product MTCOS Pro 2.5 SSCD / P60D145VB_J (P6022y VB) provided by MaskTech International GmbH. The TOE is a combination of hardware and software configured to securely create, use and manage signature creation data (SCD). The TOE, a secure signature creation device (SSCD), protects the SCD during its whole life cycle as to be used in a signature creation process solely by its signatory. The TOE comprises all IT security functionality necessary to ensure the secrecy of the SCD and the security of the electronic signature. \n\nThe TOE identified in this certificate fulfils PP EN 419211-2:2013, PP EN 419211-4:2013 as well as PP EN 419211-5:2013 and is therefore a compliant signature creation device according to Article 30(3.(a)) (“Certification of qualified electronic signature creation devices”, 3.(a)) of eIDAS Regulation (Regulation No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014).'}, 'subcategory': 'Secure Signature Creation Devices (SSCD)'}}.
  • 24.03.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1148-V2-2023', 'BSI-DSZ-CC-1147-V2-2023']}}} data.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1033-2019']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1147-2020', 'BSI-DSZ-CC-1034-2019', 'BSI-DSZ-CC-1033-2019', 'BSI-DSZ-CC-1033-V2-2021', 'BSI-DSZ-CC-1034-V2-2021', 'BSI-DSZ-CC-1148-2020']}}} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1033-2019']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1147-2020', 'BSI-DSZ-CC-1034-2019', 'BSI-DSZ-CC-1033-2019', 'BSI-DSZ-CC-1033-V2-2021', 'BSI-DSZ-CC-1034-V2-2021', 'BSI-DSZ-CC-1148-2020']}}} data.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1034-V2-2021']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1034-V2-2021']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/0995c_pdf.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.masktech.de/.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD-PP_V1.10', 'MRTD_ICAO_EAC_V1.3']}}]}.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1148-2020']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'MRTD_ICAO_EAC_V1.3', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The errors property was set to [].

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1148-2020']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0995a_pdf.pdf, code: nok'].

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-0973-V2-2016']}}} data.
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-0973-V2-2016']}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD-PP_V1.10', 'MRTD_ICAO_EAC_V1.3']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2']}}} data.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'PGP': {'PGP': 2}}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0995a_pdf.pdf', 'st_filename': '0995b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0995-2018': 36}}}}, 'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL 4': 1}}}}, 'cc_sar': {'__update__': {'AVA': {'__update__': {'AVA_VAN.5': 4}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES-128': 3}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}, '3DES': {'__update__': {'3DES': 11}}}}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 32}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'BSI': {'__delete__': ['AIS 9']}, 'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}, 'ICAO': {'__update__': {'ICAO': 13}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'__insert__': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Application”, MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), MaskTech International GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0995-2018, Version 1.1, 16.02.2018, Security Target – Machine': 1, '- MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile Machine Readable Travel Document with "ICAO Application", Extended Access': 1, 'VB, Certification ID BSI-DSZ-CC-0973-V2, version 1, 25.08.2016, TĂśV Informationstechnik GmbH (confidential document) [17] Certification Report Crypto Library V3.1.x on P6022y VB, Report number NSCIB- CC-67206-CR2': 1, '11.2017, TĂśV Rheinland Nederland B.V. (confidential document) [18] ETR for Composite Evaluation Crypto Library V3.1.x on P6022y VB EAL6+/5+, Certification ID': 1, 'Reference 17-RPT-421, version 3.0, 24.10.2017, Brightsight B.V., (confidential document) [19] Product data sheet, Secure high-performace smart card controller, SmartMX2 family P6022y VB': 1}, '__delete__': ['identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification', 'O Application”, MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), MaskTech International GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0995-2018, Version 1.1, 16.02.2018, Security Target – Machine', ') - MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile Machine Readable Travel Document with "ICAO Application", Extended Access', '6022y VB, Certification ID BSI-DSZ-CC-0973-V2, version 1, 25.08.2016, TĂśV Informationstechnik GmbH (confidential document) [17] Certification Report Crypto Library V3.1.x on P6022y VB, Report number NSCIB- CC-67206-CR2', '17.11.2017, TĂśV Rheinland Nederland B.V. (confidential document) [18] ETR for Composite Evaluation Crypto Library V3.1.x on P6022y VB EAL6+/5+, Certification ID', 'CC-17-67206, Reference 17-RPT-421, version 3.0, 24.10.2017, Brightsight B.V., (confidential document) [19] Product data sheet, Secure high-performace smart card controller, SmartMX2 family P6022y VB']}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'AGD': {'__update__': {'AGD_PRE.1': 3}}, 'ATE': {'__update__': {'ATE_DPT.2': 2}}}, '__delete__': ['ACE']}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS.1': 13}}, 'FCS': {'__insert__': {'FCS_COP': 87, 'FCS_CKM': 59}, '__update__': {'FCS_RNG.1': 5, 'FCS_CKM.1': 27, 'FCS_COP.1': 49, 'FCS_CKM.4': 48}}, 'FDP': {'__insert__': {'FDP_ACC': 18, 'FDP_ACF': 16, 'FDP_UCT': 9, 'FDP_UIT': 8, 'FDP_ITC': 8, 'FDP_SOP.1': 4}, '__update__': {'FDP_ACC.1': 14, 'FDP_ACF.1': 21, 'FDP_RIP.1': 12, 'FDP_UCT.1': 2, 'FDP_UIT.1': 3}}, 'FIA': {'__insert__': {'FIA_API': 8, 'FIA_UID': 15, 'FIA_UAU': 68, 'FIA_AFL': 7, 'FIA_AFL.1': 2}, '__update__': {'FIA_API.1': 10, 'FIA_UID.1': 7, 'FIA_UAU.1': 5, 'FIA_UAU.4': 2, 'FIA_UAU.5': 6, 'FIA_UAU.6': 3}}, 'FMT': {'__insert__': {'FMT_MTD': 83, 'FMT_SMR': 26}, '__update__': {'FMT_MSA.3': 5, 'FMT_SMR.1': 13, 'FMT_SMF.1': 53, 'FMT_LIM.1': 18, 'FMT_LIM.2': 17, 'FMT_MTD.1': 16, 'FMT_MSA.1': 3}}, 'FPT': {'__update__': {'FPT_EMS.1.2': 3, 'FPT_FLS.1': 13, 'FPT_PHP.3': 13}}, 'FTP': {'__insert__': {'FTP_ITC': 16}, '__update__': {'FTP_ITC.1': 7}}}}, 'cc_claims': {'__update__': {'O': {'__delete__': ['O.DF']}}, '__delete__': ['A']}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP Semiconductors': 9}, '__delete__': ['NXP']}, 'Gemalto': {'__update__': {'Gemalto': 3}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 41}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 12}}, '3DES': {'__update__': {'3DES': 13, 'Triple-DES': 3}}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'KMAC': 5, 'CMAC': 9}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDSA': {'__update__': {'ECDSA': 24}}}}, 'FF': {'__update__': {'DH': {'__update__': {'DH': 8}}}, '__delete__': ['DSA']}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 17}}, 'KA': {'__delete__': ['KA']}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 335}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 11}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 17}}}}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'Malfunction': 14, 'malfunction': 8}}}}, 'tee_name': {'__update__': {'IBM': {'__update__': {'SSC': 2}, '__delete__': ['SE']}}}, 'ic_data_group': {'__update__': {'EF': {'__update__': {'EF.DG4': 14, 'EF.DG16': 8, 'EF.DG15': 2}}}}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 14443': 2, 'ISO/IEC 7816-4': 1}}, 'ICAO': {'__update__': {'ICAO': 14}}}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1033-2019']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1147-2020', 'BSI-DSZ-CC-1034-2019', 'BSI-DSZ-CC-1033-2019', 'BSI-DSZ-CC-1033-V2-2021', 'BSI-DSZ-CC-1034-V2-2021', 'BSI-DSZ-CC-1148-2020']}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD-PP_V1.10', 'MRTD_ICAO_EAC_V1.3']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'http://www.sogisportal.eu/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0995-2018': 64, 'BSI-DSZ-CC-0996-2018': 4, 'BSI-DSZ-CC-0973-V2-2016': 2, 'BSI-DSZ-CC-0973-V2': 9}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-V2-2012-MA-': 1, 'BSI-CC-PP-0068-V2-2011': 1, 'BSI-CC-PP-0056-V2-': 1, 'BSI-CC-PP-0056-V2-2012-MA-02': 2, 'BSI-CC-PP-0068-V2-': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 8, 'EAL 2': 3, 'EAL 1': 1, 'EAL5+': 1, 'EAL6': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 5 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 5, 'ALC_FLR': 1, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_COMP.1': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP Semiconductors': 2, 'NXP': 6}, 'Gemalto': {'Gemalto': 1}}, 'eval_facility': {'BrightSight': {'Brightsight': 1}, 'TUV': {'TĂśV Informationstechnik': 1}, 'SRC': {'SRC Security Research & Consulting': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES-128': 9, 'AES': 9}}, 'DES': {'DES': {'DES': 18}, '3DES': {'3DES': 17}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'PACE': {'PACE': 35}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}, 'FI': {'fault injection': 2}, 'other': {'JIL': 5}}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 36': 4, 'AIS 25': 2, 'AIS 31': 2, 'AIS 35': 2, 'AIS 9': 1, 'AIS 20': 1, 'AIS 26': 1, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2}, 'ICAO': {'ICAO': 15}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'O Application”, MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), MaskTech International GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0995-2018, Version 1.1, 16.02.2018, Security Target – Machine': 1, ') - MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile Machine Readable Travel Document with "ICAO Application", Extended Access': 1, '2.5 EAC with PACE / P60D145VB_J (P6022y VB), MaskTech International GmbH, Version 0.3, 16.02.2018 (confidential document) [12] MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) User Guidance, MaskTech International': 1, '6022y VB, Certification ID BSI-DSZ-CC-0973-V2, version 1, 25.08.2016, TĂśV Informationstechnik GmbH (confidential document) [17] Certification Report Crypto Library V3.1.x on P6022y VB, Report number NSCIB- CC-67206-CR2': 1, '17.11.2017, TĂśV Rheinland Nederland B.V. (confidential document) [18] ETR for Composite Evaluation Crypto Library V3.1.x on P6022y VB EAL6+/5+, Certification ID': 1, 'CC-17-67206, Reference 17-RPT-421, version 3.0, 24.10.2017, Brightsight B.V., (confidential document) [19] Product data sheet, Secure high-performace smart card controller, SmartMX2 family P6022y VB': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0973-V2': 6}, 'NL': {'NSCIB-CC-15-67206-CR2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 2, 'BSI-CC-PP-0068-V2': 2, 'BSI-CC-PP-0056-': 1, 'BSI-CC-PP-0055': 1, 'BSI-CC-PP-0056-V2': 1, 'BSI-CC-PP-0056-V2-2011': 1, 'BSI-CC-PP-0056-V2-2012': 2, 'BSI-CC-PP-0068-V2-2011': 2, 'BSI-CC-PP-0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL5': 14, 'EAL4': 1, 'EAL5 augmented': 6}}, 'cc_sar': {'ACE': {'ACE_CAM': 7, 'ACE_ENC': 14, 'ACE_MAC': 12}, 'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1, 'ADV_IMP.1': 2, 'ADV_FSP.5': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 7, 'ALC_DEL.1': 2, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1, 'ALC_FLR.1': 1}, 'ATE': {'ATE_DPT.2': 1, 'ATE_DPT.3': 2, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 2, 'AVA_VAN.5': 7}, 'ASE': {'ASE_INT.1': 2, 'ASE_CCL.1': 2, 'ASE_SPD.1': 2, 'ASE_OBJ.2': 2, 'ASE_ECD.1': 2, 'ASE_REQ.2': 2, 'ASE_TSS.1': 2, 'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 9, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RND.1': 16, 'FCS_RNG.1': 4, 'FCS_CKM.1': 17, 'FCS_CKM.2': 8, 'FCS_COP.1': 8, 'FCS_CKM.4': 44, 'FCS_CKM.4.1': 1, 'FCS_RND.1.1': 1, 'FCS_RND.1.2': 1}, 'FDP': {'FDP_ITC.1': 14, 'FDP_ITC.2': 7, 'FDP_ACC.1': 7, 'FDP_ACF.1': 3, 'FDP_RIP.1': 10, 'FDP_RIP.1.1': 1, 'FDP_UCT.1': 1, 'FDP_IFC.1': 7, 'FDP_UIT.1': 1, 'FDP_ITT.1': 3, 'FDP_SDC.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_API.1': 9, 'FIA_UID.1': 5, 'FIA_UAU.1': 3, 'FIA_UAU.4': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 2, 'FIA_UAU.6': 1, 'FIA_API.1.1': 1, 'FIA_ACC.1.1': 1}, 'FMT': {'FMT_MSA.3': 3, 'FMT_MTD.3': 10, 'FMT_SMR.1': 23, 'FMT_SMF.1': 50, 'FMT_SMF.1.1': 1, 'FMT_LIM.1': 19, 'FMT_LIM.2': 19, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 1, 'FMT_MTD.1': 4, 'FMT_MTD.3.1': 1, 'FMT_MSA.1': 1}, 'FPT': {'FPT_EMS.1': 15, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 2, 'FPT_FLS.1': 14, 'FPT_FLS.1.1': 1, 'FPT_TST.1': 11, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_PHP.3': 11, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 3}, 'FRU': {'FRU_FLT.2': 4}, 'FTP': {'FTP_ITC.1': 4, 'FTP_TRP.1': 4}}, 'cc_claims': {'O': {'O.DF': 1, 'O.EEPROM_INTEGRITY': 3, 'O.TDES': 4, 'O.SW_DES': 4, 'O.AES': 4, 'O.SW_AES': 4, 'O.RSA': 5, 'O.ECDSA': 5, 'O.ECC_DHKE': 4, 'O.SHA': 3, 'O.MEM_ACCESS': 3, 'O.SFR_ACCESS': 3, 'O.RND': 1, 'O.CUST_RECONFIG_PLAIN': 1, 'O.FM_FW': 1, 'O.PUF': 1, 'O.COPY': 1, 'O.COMPARE': 1, 'O.REUSE': 1}, 'T': {'T.RND': 1}, 'A': {'A': 1}}, 'vendor': {'NXP': {'NXP Semiconductors': 8, 'NXP': 2}, 'Gemalto': {'Gemalto': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 61}}, 'DES': {'DES': {'DES': 62}, '3DES': {'3DES': 14, 'Triple-DES': 5, 'TDES': 15}}, 'constructions': {'MAC': {'KMAC': 9, 'CMAC': 13}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 6}, 'ECDSA': {'ECDSA': 26}, 'ECC': {'ECC': 17}}, 'FF': {'DH': {'Diffie-Hellman': 20, 'DH': 15}, 'DSA': {'DSA': 26}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-224': 4, 'SHA-256': 5, 'SHA-384': 4, 'SHA-512': 4, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 73}, 'KA': {'Key Agreement': 2, 'KA': 6}}, 'crypto_protocol': {'PACE': {'PACE': 505}}, 'randomness': {'RNG': {'RNG': 12, 'RND': 2}}, 'cipher_mode': {'CBC': {'CBC': 25}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 5, 'physical probing': 6, 'DPA': 1}, 'FI': {'Physical tampering': 3, 'physical tampering': 3, 'Malfunction': 23, 'malfunction': 7, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 3, 'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 10, 'EF.DG2': 4, 'EF.DG3': 14, 'EF.DG4': 13, 'EF.DG5': 3, 'EF.DG16': 9, 'EF.DG14': 5, 'EF.DG15': 3, 'EF.DG13': 1, 'EF.COM': 3, 'EF.SOD': 5}}, 'standard_id': {'FIPS': {'FIPS 180-4': 1, 'FIPS 140-2': 2, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-4': 1, 'FIPS PUB 197': 1, 'FIPS PUB 46-3': 1}, 'PKCS': {'PKCS #1': 1, 'PKCS #3': 1}, 'BSI': {'AIS 31': 1}, 'RFC': {'RFC 2631': 1, 'RFC 3369': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 15946-3': 1, 'ISO/IEC 7816:2008': 1, 'ISO/IEC 9797:1999': 1}, 'ICAO': {'ICAO': 23}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'fc4bbb40be46caf5dffde0c7fba7c70b20a43d980cb85a3e983b4ef92872c859', 'st_pdf_hash': '4cae51e22c9795b181c646d66e88668744e3a0bab33014eecad6065a98c38ae1', 'report_txt_hash': 'a25b9f07c7fc589cf5c54b096c7fee3a958ca26692ff437817ae46535b571ec7', 'st_txt_hash': '20f6a17d54f9ec186625fc28fd61d33076b3fa9dc7e32b9dc344718e14e2bcab'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES-128': 9, 'AES': 9, '3DES': 17, 'DES': 1}, 'rules_asymmetric_crypto': {'ECC': 1, 'Diffie-Hellman': 1, 'DSA': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'PACE': 35, 'MAC': 1, 'Key Exchange': 1}, 'rules_randomness': {'RNG': 1}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'side channel': 1, 'fault injection': 2}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 61, 'DES': 33, '3DES': 14, 'TDES': 15, 'KMAC': 9}, 'rules_asymmetric_crypto': {'ECDH': 6, 'ECDSA': 26, 'ECC': 17, 'Diffie-Hellman': 20, 'DH': 15, 'DSA': 26}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 7, 'SHA-224': 4, 'SHA-256': 5, 'SHA-384': 4, 'SHA-512': 4}, 'rules_crypto_schemes': {'PACE': 505, 'MAC': 73}, 'rules_randomness': {'RNG': 12, 'RND': 2}, 'rules_tee': {'SSC': 3, 'SE': 1}, 'rules_side_channels': {'Malfunction': 23, 'malfunction': 7, 'Leak-Inherent': 5, 'physical probing': 6, 'Physical tampering': 3, 'physical tampering': 3, 'DPA': 1, 'fault injection': 1, 'reverse engineering': 1}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2', 'NSCIB-CC-15-67206-CR2']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2', 'NSCIB-CC-15-67206-CR2']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1064-2020', 'BSI-DSZ-CC-0996-2018', 'BSI-DSZ-CC-1001-2018']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0995-2018', 'BSI-DSZ-CC-1065-2020', 'BSI-DSZ-CC-0996-2018', 'BSI-DSZ-CC-1001-2018', 'BSI-DSZ-CC-1036-2019', 'BSI-DSZ-CC-1064-2020']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2', 'BSI-DSZ-CC-0996-2018', 'BSI-DSZ-CC-0973-V2-2016']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0995-2018', 'BSI-DSZ-CC-0973-V2', 'BSI-DSZ-CC-0996-2018', 'BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0973-2016']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2.5']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0996-2018', 'BSI-DSZ-CC-1001-2018', 'BSI-DSZ-CC-1064-2020']}.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD-PP_V1.10', 'MRTD_ICAO_EAC_V1.3']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/0995c_pdf.pdf",
  "dgst": "00ad121fa63e5dfb",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0995-2018",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.5"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1033-2019",
          "BSI-DSZ-CC-1064-2020",
          "BSI-DSZ-CC-1001-2018",
          "BSI-DSZ-CC-0996-2018"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0996-2018",
          "BSI-DSZ-CC-0973-V2-2016"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1148-V3-2023",
          "BSI-DSZ-CC-1065-2020",
          "BSI-DSZ-CC-1064-2020",
          "BSI-DSZ-CC-1211-2023",
          "BSI-DSZ-CC-1147-V3-2023",
          "BSI-DSZ-CC-1034-V2-2021",
          "BSI-DSZ-CC-1148-2020",
          "BSI-DSZ-CC-1033-V2-2021",
          "BSI-DSZ-CC-1148-V2-2023",
          "BSI-DSZ-CC-1034-2019",
          "BSI-DSZ-CC-1036-2019",
          "BSI-DSZ-CC-1033-2019",
          "BSI-DSZ-CC-0996-2018",
          "BSI-DSZ-CC-1147-V2-2023",
          "BSI-DSZ-CC-0995-2018",
          "BSI-DSZ-CC-1001-2018",
          "BSI-DSZ-CC-1147-2020"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0996-2018",
          "BSI-DSZ-CC-0973-2016",
          "BSI-DSZ-CC-0973-V2-2016",
          "BSI-DSZ-CC-0995-2018"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "MaskTech International GmbH",
  "manufacturer_web": "https://www.masktech.de/",
  "name": "MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB)",
  "not_valid_after": "2023-04-30",
  "not_valid_before": "2018-04-30",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "0995c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0995-2018": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 5": 2,
          "EAL 5 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ICAO": {
          "ICAO": 1
        },
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180504104251+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, MRTD, EAC with PACE\"",
      "/ModDate": "D:20180524121743+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB)",
      "/Title": "Certificate BSI-DSZ-CC-0995-2018",
      "pdf_file_size_bytes": 364943,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "0995a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0995-2018",
        "cert_item": "MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB",
        "cert_lab": "BSI",
        "developer": "MaskTech International GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Machine Readable Travel Document with \"ICAO Application\", Extended Access Control with PACE (EAC PP), Version 1.3.2, 5 December 2012, BSI- CC-PP-0056-V2-2012-MA-02"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0973-V2-2016": 1,
          "BSI-DSZ-CC-0995-2018": 18,
          "BSI-DSZ-CC-0996-2018": 2,
          "BSI-DSZ-CC-1001-": 1,
          "BSI-DSZ-CC-S-0064-2016": 1,
          "BSI-DSZ-CC-S-0073-2016": 1
        },
        "NL": {
          "CC-17-67206": 3,
          "CC-67206-CR2": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-": 1,
          "BSI-CC-PP-0056-V2-2012-MA-": 1,
          "BSI-CC-PP-0056-V2-2012-MA-02": 2,
          "BSI-CC-PP-0068-V2-": 1,
          "BSI-CC-PP-0068-V2-2011": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.5": 1,
          "ALC_COMP.1": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 5,
          "ALC_FLR": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 4": 1,
          "EAL 5": 8,
          "EAL 5 augmented": 3,
          "EAL 5+": 1,
          "EAL 6": 1,
          "EAL5+": 1,
          "EAL6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "- MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), SRC Security Research \u0026 Consulting GmbH (confidential document) [9] Protection Profile Machine Readable Travel Document with \"ICAO Application\", Extended Access": 1,
          "11.2017, T\u00dcV Rheinland Nederland B.V. (confidential document) [18] ETR for Composite Evaluation Crypto Library V3.1.x on P6022y VB EAL6+/5+, Certification ID": 1,
          "2.5 EAC with PACE / P60D145VB_J (P6022y VB), MaskTech International GmbH, Version 0.3, 16.02.2018 (confidential document) [12] MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) User Guidance, MaskTech International": 1,
          "Application\u201d, MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB), MaskTech International GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0995-2018, Version 1.1, 16.02.2018, Security Target \u2013 Machine": 1,
          "Reference 17-RPT-421, version 3.0, 24.10.2017, Brightsight B.V., (confidential document) [19] Product data sheet, Secure high-performace smart card controller, SmartMX2 family P6022y VB": 1,
          "VB, Certification ID BSI-DSZ-CC-0973-V2, version 1, 25.08.2016, T\u00dcV Informationstechnik GmbH (confidential document) [17] Certification Report Crypto Library V3.1.x on P6022y VB, Report number NSCIB- CC-67206-CR2": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX2": 1
        }
      },
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 32
        },
        "PGP": {
          "PGP": 2
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        },
        "SRC": {
          "SRC Security Research \u0026 Consulting": 3
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 2
        },
        "SCA": {
          "side channel": 1
        },
        "other": {
          "JIL": 5
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 25": 2,
          "AIS 26": 1,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 4,
          "AIS 38": 1
        },
        "ICAO": {
          "ICAO": 13
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9,
            "AES-128": 3
          }
        },
        "DES": {
          "3DES": {
            "3DES": 11
          },
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 1
        },
        "NXP": {
          "NXP": 6,
          "NXP Semiconductors": 2
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20180504104224+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, MRTD, EAC with PACE\"",
      "/ModDate": "D:20180504111206+02\u002700\u0027",
      "/Producer": "LibreOffice 5.2",
      "/Subject": "MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB)",
      "/Title": "Certification Report BSI-DSZ-CC-0995-2018",
      "pdf_file_size_bytes": 825111,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "http://www.commoncriteriaportal.org/cc/",
          "http://www.sogisportal.eu/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "0995b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 17
          },
          "ECDH": {
            "ECDH": 6
          },
          "ECDSA": {
            "ECDSA": 24
          }
        },
        "FF": {
          "DH": {
            "DH": 8,
            "Diffie-Hellman": 20
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0995": 1,
          "BSI-DSZ-CC-1001": 1,
          "BSI-DSZ-CC-S-0064-2016": 1,
          "BSI-DSZ-CC-S-0073-2016": 1,
          "BSI-DSZ-CC-S-0097-2017": 1
        },
        "NL": {
          "CC-17-67206": 1,
          "NSCIB-CC-15-67206-CR2": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.AES": 4,
          "O.COMPARE": 1,
          "O.COPY": 1,
          "O.CUST_RECONFIG_PLAIN": 1,
          "O.ECC_DHKE": 4,
          "O.ECDSA": 5,
          "O.EEPROM_INTEGRITY": 3,
          "O.FM_FW": 1,
          "O.MEM_ACCESS": 3,
          "O.PUF": 1,
          "O.REUSE": 1,
          "O.RND": 1,
          "O.RSA": 5,
          "O.SFR_ACCESS": 3,
          "O.SHA": 3,
          "O.SW_AES": 4,
          "O.SW_DES": 4,
          "O.TDES": 4
        },
        "T": {
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0055-2009": 1,
          "BSI-CC-PP-0056-": 1,
          "BSI-CC-PP-0056-V2": 1,
          "BSI-CC-PP-0056-V2-2011": 1,
          "BSI-CC-PP-0056-V2-2012": 2,
          "BSI-CC-PP-0068-V2": 2,
          "BSI-CC-PP-0068-V2-2011": 2,
          "BSI-CC-PP-0084-2014": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_IMP.1": 2,
          "ADV_INT.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS.2": 7,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 2,
          "ASE_INT.1": 2,
          "ASE_OBJ.2": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 2,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.2": 2,
          "ATE_DPT.3": 2,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 2,
          "AVA_VAN.5": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 1,
          "EAL5": 14,
          "EAL5 augmented": 6
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 13,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 59,
          "FCS_CKM.1": 27,
          "FCS_CKM.2": 8,
          "FCS_CKM.4": 48,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 87,
          "FCS_COP.1": 49,
          "FCS_RND.1": 16,
          "FCS_RND.1.1": 1,
          "FCS_RND.1.2": 1,
          "FCS_RNG.1": 5
        },
        "FDP": {
          "FDP_ACC": 18,
          "FDP_ACC.1": 14,
          "FDP_ACF": 16,
          "FDP_ACF.1": 21,
          "FDP_IFC.1": 7,
          "FDP_ITC": 8,
          "FDP_ITC.1": 14,
          "FDP_ITC.2": 7,
          "FDP_ITT.1": 3,
          "FDP_RIP.1": 12,
          "FDP_RIP.1.1": 1,
          "FDP_SDC.1": 1,
          "FDP_SDI.2": 1,
          "FDP_SOP.1": 4,
          "FDP_UCT": 9,
          "FDP_UCT.1": 2,
          "FDP_UIT": 8,
          "FDP_UIT.1": 3
        },
        "FIA": {
          "FIA_ACC.1.1": 1,
          "FIA_AFL": 7,
          "FIA_AFL.1": 2,
          "FIA_API": 8,
          "FIA_API.1": 10,
          "FIA_API.1.1": 1,
          "FIA_UAU": 68,
          "FIA_UAU.1": 5,
          "FIA_UAU.4": 2,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 6,
          "FIA_UAU.6": 3,
          "FIA_UID": 15,
          "FIA_UID.1": 7
        },
        "FMT": {
          "FMT_LIM.1": 18,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 17,
          "FMT_LIM.2.1": 1,
          "FMT_MSA.1": 3,
          "FMT_MSA.3": 5,
          "FMT_MTD": 83,
          "FMT_MTD.1": 16,
          "FMT_MTD.3": 10,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 53,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 26,
          "FMT_SMR.1": 13
        },
        "FPT": {
          "FPT_EMS.1": 15,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 13,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 3,
          "FPT_PHP.3": 13,
          "FPT_PHP.3.1": 1,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 4
        },
        "FTP": {
          "FTP_ITC": 16,
          "FTP_ITC.1": 7,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 17
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 335
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 17
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 4,
            "SHA-256": 5,
            "SHA-384": 4,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 3,
          "EF.DG1": 10,
          "EF.DG13": 1,
          "EF.DG14": 5,
          "EF.DG15": 2,
          "EF.DG16": 8,
          "EF.DG2": 4,
          "EF.DG3": 14,
          "EF.DG4": 14,
          "EF.DG5": 3,
          "EF.SOD": 5
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 11
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 14,
          "Physical tampering": 3,
          "fault injection": 1,
          "malfunction": 8,
          "physical tampering": 3
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 5,
          "physical probing": 6
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1
        },
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-002": 2,
          "CCMB-2012-09-003": 2,
          "CCMB-2012-09-004": 2
        },
        "FIPS": {
          "FIPS 140-2": 2,
          "FIPS 180-4": 1,
          "FIPS PUB 140-2": 1,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 1
        },
        "ICAO": {
          "ICAO": 14
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 15946-3": 1,
          "ISO/IEC 7816": 2,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 7816:2008": 1,
          "ISO/IEC 9797:1999": 1
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS #3": 1
        },
        "RFC": {
          "RFC 2631": 1,
          "RFC 3369": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 41
          }
        },
        "DES": {
          "3DES": {
            "3DES": 13,
            "TDES": 15,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 12
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 9,
            "KMAC": 5
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 1
        }
      },
      "tee_name": {
        "IBM": {
          "SSC": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 3
        },
        "NXP": {
          "NXP Semiconductors": 9
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "MaskTech International GmbH",
      "/CreationDate": "D:20180222124104+01\u002700\u0027",
      "/Creator": "LaTeX with hyperref package",
      "/Keywords": "Common Criteria, CC, Machine Readable Travel Document, MRTD, EAC with PACE, ePass, MTCOS, EAL 5+",
      "/ModDate": "D:20180427095219+02\u002700\u0027",
      "/PTEX.Fullbanner": "This is pdfTeX, Version 3.14159265-2.6-1.40.15 (TeX Live 2014/Cygwin) kpathsea version 6.2.0",
      "/Producer": "pdfTeX-1.40.15",
      "/Subject": "Common Criteria Certification",
      "/Title": "MTCOS Pro 2.5 ICAO - EAC with PACE / P60D145VB_J (P6022y VB) - Security Target lite",
      "/Trapped": "/False",
      "pdf_file_size_bytes": 629043,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 115
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "MRTD-PP_V1.10",
            "MRTD_ICAO_EAC_V1.3"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf",
        "pp_name": "Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0995a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "ALC_DVS.2",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0995b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "01b740642da33136041ecda53090e97de3ec48f125b37931e52f667b08997069",
      "txt_hash": "8b9c8d397c4303ccd02b6f11d4d11f2f7e919289cce08b292c39fde1fcc993e2"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "fc4bbb40be46caf5dffde0c7fba7c70b20a43d980cb85a3e983b4ef92872c859",
      "txt_hash": "a25b9f07c7fc589cf5c54b096c7fee3a958ca26692ff437817ae46535b571ec7"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4cae51e22c9795b181c646d66e88668744e3a0bab33014eecad6065a98c38ae1",
      "txt_hash": "20f6a17d54f9ec186625fc28fd61d33076b3fa9dc7e32b9dc344718e14e2bcab"
    }
  },
  "status": "archived"
}