MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC)
CSV information ?
Status | archived |
---|---|
Valid from | 30.04.2018 |
Valid until | 30.04.2023 |
Scheme | đ©đȘ DE |
Manufacturer | MaskTech International GmbH |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL4+, ALC_DVS.2 |
Heuristics summary ?
Certificate ?
Extracted keywords
Protocols
PACESecurity level
EAL 4, EAL 5, EAL 2, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2Protection profiles
BSI-CC-PP-0055-2009Certificates
BSI-DSZ-CC-0996-2018Standards
ISO/IEC 15408, ISO/IEC 18045, ICAOFile metadata
Title: | Certificate BSI-DSZ-CC-0996-2018 |
---|---|
Subject: | MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC) |
Keywords: | "Common Criteria, Certification, Zertifizierung, MRTD, EAC, BAC, PACE, Reisepass, ePassport, Extended Access Control, MTCOS, MaskTech" |
Author: | Bundesamt fĂŒr Sicherheit in der Informationstechnik |
Creation date: | D:20180507120459+02'00' |
Modification date: | D:20180524131239+02'00' |
Pages: | 1 |
Creator: | Writer |
Producer: | LibreOffice 5.2 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES-128, AES, DES, 3DESAsymmetric Algorithms
ECC, Diffie-Hellman, DSAHash functions
SHA-2Schemes
MAC, Key ExchangeProtocols
PACE, PGPRandomness
RNGEngines
SmartMX2Vendor
NXP Semiconductors, NXP, GemaltoSecurity level
EAL 4, EAL 5, EAL 2, EAL 1, EAL5+, EAL6, EAL 5+, EAL 6, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_COMP.1, ATE_IND, AVA_VANProtection profiles
BSI-CC-PP-0055-2009, BSI-CC-PP- 0055-2009Certificates
BSI-DSZ-CC-0996-2018, BSI-DSZ-CC-0995-2018, BSI-DSZ-CC-1001-, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-S-0073-2016, BSI-DSZ-CC-S-0064-2016, CC-17-67206, CC-67206-CR2Evaluation facilities
Brightsight, TĂV Informationstechnik, SRC Security Research & ConsultingCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Readable Travel Document with âICAO Applicationâ Basic Access Control, MaskTech International GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0996-2018, Version 1.1 16.02.2018, Security Target - MTCOS Pro 2.5, Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC), SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile Machine Readable Travel Document with "ICAO Application" Basic Access, VB, Certification ID BSI-DSZ-CC-0973-V2, version 1, 25.08.2016, TĂV Informationstechnik GmbH (confidential document) [17] Certification Report Crypto Library V3.1.x on P6022y VB, Report number NSCIB- CC-67206-CR2, 11.2017, TĂV Rheinland Nederland B.V. (confidential document) [18] ETR for Composite Evaluation Crypto Library V3.1.x on P6022y VB EAL6+/5+, Certification ID, Reference 17-RPT-421, version 3.0, 24.10.2017, Brightsight B.V., (confidential document) [19] Product data sheet, Secure high-performace smart card controller, SmartMX2 family P6022y VBSide-channel analysis
side channel, fault injection, JILCertification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Readable Travel Document with âICAO Applicationâ Basic Access Control, MaskTech International GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0996-2018, Version 1.1 16.02.2018, Security Target - MTCOS Pro 2.5, Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC), SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile Machine Readable Travel Document with "ICAO Application" Basic Access, VB, Certification ID BSI-DSZ-CC-0973-V2, version 1, 25.08.2016, TĂV Informationstechnik GmbH (confidential document) [17] Certification Report Crypto Library V3.1.x on P6022y VB, Report number NSCIB- CC-67206-CR2, 11.2017, TĂV Rheinland Nederland B.V. (confidential document) [18] ETR for Composite Evaluation Crypto Library V3.1.x on P6022y VB EAL6+/5+, Certification ID, Reference 17-RPT-421, version 3.0, 24.10.2017, Brightsight B.V., (confidential document) [19] Product data sheet, Secure high-performace smart card controller, SmartMX2 family P6022y VBStandards
AIS 34, AIS 36, AIS 25, AIS 31, AIS 35, AIS 20, AIS 26, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 7816, ISO/IEC 14443, ICAOTechnical reports
BSI 7148File metadata
Title: | Certification Report BSI-DSZ-CC-0996-2018 |
---|---|
Subject: | MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC) |
Keywords: | "Common Criteria, Certification, Zertifizierung, MRTD, EAC, BAC, PACE, Reisepass, ePassport, Extended Access Control, MTCOS, MaskTech" |
Author: | Bundesamt fĂŒr Sicherheit in der Informationstechnik |
Creation date: | D:20180507120438+02'00' |
Modification date: | D:20180507130521+02'00' |
Pages: | 29 |
Creator: | Writer |
Producer: | LibreOffice 5.2 |
Frontpage
Certificate ID: | BSI-DSZ-CC-0996-2018 |
---|---|
Certified item: | MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC |
Certification lab: | BSI |
Developer: | MaskTech International GmbH |
References
Outgoing- BSI-DSZ-CC-0995-2018 - MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB)
- BSI-DSZ-CC-0973-V2-2016 - NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
- BSI-DSZ-CC-1001-2018 - MTCOS Pro 2.5 SSCD / P60D145VB_J (P6022y VB)
- BSI-DSZ-CC-0995-2018 - MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB)
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDES, 3DES, KMAC, CMACAsymmetric Algorithms
ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2Schemes
MAC, Key AgreementProtocols
PACERandomness
RND, RNGBlock cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG13, EF.DG15, EF.DG14, EF.COM, EF.SODTrusted Execution Environments
SSCVendor
NXP Semiconductors, GemaltoSecurity level
EAL4, EAL5, EAL4 augmented, EAL5 augmentedClaims
O.EEPROM_INTEGRITY, O.TDES, O.AES, O.SW_AES, O.MEM_ACCESS, O.SFR_ACCESS, O.RND, O.CUST_RECONFIG_PLAIN, O.FM_FW, O.PUF, O.SW_DES, O.RSA, O.ECDSA, O.ECC_DHKE, O.SHA, O.COPY, O.COMPARE, O.REUSE, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_FLR.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_RND.1, FCS_CKM.4.1, FCS_COP, FCS_RND.1.1, FCS_RND.1.2, FCS_RNG.1, FCS_UID.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UIT.1, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC, FDP_ITT.1, FDP_SDC.1, FDP_SDI.2, FDP_RIP.1, FDP_SOP.1, FIA_UAU.5.2, FIA_UAU.4, FIA_AFL.1, FIA_UAU.6, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.6.1, FIA_AFL.6, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MTD, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD.1, FMT_MSA.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0055, BSI-CC-PP-0056, BSI-CC-PP-0055-2009, BSI-CC-PP-0056-2009Certificates
BSI-DSZ-CC-0996, BSI-DSZ-CC-1001, BSI-DSZ-CC-0995, BSI-DSZ-CC-S-0064-2016, BSI-DSZ-CC-S-0073-2016, BSI-DSZ-CC-S-0097-2017, CC-17-67206, NSCIB-CC-15-67206-CR2Side-channel analysis
Leak-Inherent, physical probing, DPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS 180-4, FIPS 46-3, FIPS 140-2, FIPS PUB 140-2, FIPS PUB 180-4, FIPS PUB 197, FIPS PUB 46-3, AIS 31, RFC3369, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 7816-2, ISO/IEC 15946-3, ISO/IEC 7816-4, ISO/IEC 7816:2008, ISO/IEC 9797:1999, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title: | MTCOS Pro 2.5 ICAO - EAC with PACE / P60D145VB_J (P6022y VB) (BAC) - Security Target lite |
---|---|
Subject: | Common Criteria Certification |
Keywords: | Common Criteria, CC, Machine Readable Travel Document, MRTD, Basic Access Control, BAC, ePass, MTCOS, EAL 4+ |
Author: | MaskTech International GmbH |
Creation date: | D:20180216153328+01'00' |
Modification date: | D:20180216154627+01'00' |
Pages: | 84 |
Creator: | LaTeX with hyperref package |
Producer: | pdfTeX-1.40.15 |
References
OutgoingHeuristics ?
Extracted SARs
ASE_SPD.1, AGD_PRE.1, ALC_DVS.2, ASE_ECD.1, ALC_TAT.1, ALC_CMC.4, ALC_LCD.1, ASE_TSS.2, ADV_ARC.1, ADV_FSP.4, ASE_REQ.2, ALC_DEL.1, ATE_COV.2, ASE_CCL.1, ASE_INT.1, ADV_TDS.3, AGD_OPE.1, ATE_FUN.1, ADV_IMP.1, AVA_VAN.3, ALC_COMP.1, ATE_IND.2, ALC_FLR.1, ASE_OBJ.2, ALC_CMS.4, ATE_DPT.1References ?
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '44d099d6631059c38536a584bdd9a9aa5ec61d621d012f9d955910bcb03364f1', 'txt_hash': '5261d52537a0dbb1e2e816aaf081ba1b68a801523a58c52dfed3dad748114c71'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '14f70b70f40894ea17a466d6d40c2345c3e3d8bdf3b060daf151f9c9f20fb3c9', 'txt_hash': '0628c85ad628a529609f0b766e7276401ddb137ac2516b87e5f3a21864c7e0f7'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '261dd9f4cfd896df3a237959790a4fec03b3a97260895309dfa8d4ff33ebaec2', 'txt_hash': '277abf6b07d664578fdcfb9cfee13519bf1f198369ed77d1fbbb694b795ac1d2'}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': {'pdf_file_size_bytes': 360655, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt fĂŒr Sicherheit in der Informationstechnik', '/CreationDate': "D:20180507120459+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, MRTD, EAC, BAC, PACE, Reisepass, ePassport, Extended Access Control, MTCOS, MaskTech"', '/ModDate': "D:20180524131239+02'00'", '/Producer': 'LibreOffice 5.2', '/Subject': 'MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC)', '/Title': 'Certificate BSI-DSZ-CC-0996-2018', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0996-2018': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}, 'ICAO': {'ICAO': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '0996c_pdf.pdf'}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0996-2018', 'cert_item': 'MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC', 'developer': 'MaskTech International GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Machine Readable Travel Document with "ICAO Application" Basic Access Control, Version 1.10, 25 March 2009, BSI-CC-PP-0055-2009', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2'}}
. - The st_frontpage property was set to
None
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'NL': {'CC-17-67206': 3, 'CC-67206-CR2': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1001-': 1, 'BSI-DSZ-CC-S-0073-2016': 1, 'BSI-DSZ-CC-S-0064-2016': 1}, '__update__': {'BSI-DSZ-CC-0996-2018': 18, 'BSI-DSZ-CC-0995-2018': 2, 'BSI-DSZ-CC-0973-V2-2016': 1}, '__delete__': ['BSI-DSZ-CC-0973-V2']}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'BSI-DSZ-CC-0996': 1, 'BSI-DSZ-CC-1001': 1, 'BSI-DSZ-CC-0995': 2, 'BSI-DSZ-CC-S-0064-2016': 1, 'BSI-DSZ-CC-S-0073-2016': 1, 'BSI-DSZ-CC-S-0097-2017': 1}, 'NL': {'__insert__': {'CC-17-67206': 1}, '__update__': {'NSCIB-CC-15-67206-CR2': 1}}}}}
data.
- The following values were inserted:
-
13.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0973-V2': 9}, '__update__': {'BSI-DSZ-CC-0996-2018': 36, 'BSI-DSZ-CC-0995-2018': 4, 'BSI-DSZ-CC-0973-V2-2016': 2}, '__delete__': ['BSI-DSZ-CC-1001-', 'BSI-DSZ-CC-S-0073-2016', 'BSI-DSZ-CC-S-0064-2016']}}, '__delete__': ['NL']}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'BSI-DSZ-CC-0973-V2': 6}, 'NL': {'__update__': {'NSCIB-CC-15-67206-CR2': 3}, '__delete__': ['CC-17-67206']}}}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'NL': {'CC-17-67206': 3, 'CC-67206-CR2': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1001-': 1, 'BSI-DSZ-CC-S-0073-2016': 1, 'BSI-DSZ-CC-S-0064-2016': 1}, '__update__': {'BSI-DSZ-CC-0996-2018': 18, 'BSI-DSZ-CC-0995-2018': 2, 'BSI-DSZ-CC-0973-V2-2016': 1}, '__delete__': ['BSI-DSZ-CC-0973-V2']}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'BSI-DSZ-CC-0996': 1, 'BSI-DSZ-CC-1001': 1, 'BSI-DSZ-CC-0995': 2, 'BSI-DSZ-CC-S-0064-2016': 1, 'BSI-DSZ-CC-S-0073-2016': 1, 'BSI-DSZ-CC-S-0097-2017': 1}, 'NL': {'__insert__': {'CC-17-67206': 1}, '__update__': {'NSCIB-CC-15-67206-CR2': 1}}}}}
data.
- The report_keywords property was updated, with the
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
. - The report_references property was updated, with the
{'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1211-2023', 'BSI-DSZ-CC-1147-V3-2023', 'BSI-DSZ-CC-1148-V3-2023']}}}
data.
- The following values were inserted:
-
18.05.2023 The certificate data changed.
Certificate changed
The Status was updated.
- The new value is
archived
.
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The new value is
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': {'cert_id': 'BSI-DSZ-CC-1001-2018', 'product': 'MTCOS Pro 2.5 SSCD / P60D145VB_J (P6022y VB)', 'vendor': 'MaskTech International GmbH', 'certification_date': '30.04.2018', 'category': 'Digital signature', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitale_Signatur-Sichere_Signaturerstellungseinheiten/1001.html', 'enhanced': {'product': 'MTCOS Pro 2.5 SSCD / P60D145VB_J (P6022y VB)', 'applicant': 'MaskTech International GmbH\nNordostpark 45 \n90411 NĂŒrnberg', 'evaluation_facility': 'SRC Security Research & Consulting GmbH', 'assurance_level': 'EAL5+,ALC_DVS.2,AVA_VAN.5', 'protection_profile': 'EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation, 18 May 2013, BSI-CC-PP-0059-2009-MA-02, Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application, CEN / ISSS - Information Society \nStandardization System, 12 October 2013, BSI-CC-PP-0071-2012-MA-01, Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application, CEN / ISSS - Information Society Standardization System, 12 October 2013, BSI-CC-PP-0072-2012-MA-01', 'certification_date': '30.04.2018', 'expiration_date': '29.04.2023', 'entries': [{'id': 'EN'}, {'id': 'Protection'}, {'id': 'Protection'}], 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1001a_pdf.pdf?__blob=publicationFile&v=1', 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1001b_pdf.pdf?__blob=publicationFile&v=1', 'cert_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1001c_pdf.pdf?__blob=publicationFile&v=1', 'description': 'The target of evaluation (TOE) is the product MTCOS Pro 2.5 SSCD / P60D145VB_J (P6022y VB) provided by MaskTech International GmbH. The TOE is a combination of hardware and software configured to securely create, use and manage signature creation data (SCD). The TOE, a secure signature creation device (SSCD), protects the SCD during its whole life cycle as to be used in a signature creation process solely by its signatory. The TOE comprises all IT security functionality necessary to ensure the secrecy of the SCD and the security of the electronic signature. \n\nThe TOE identified in this certificate fulfils PP EN 419211-2:2013, PP EN 419211-4:2013 as well as PP EN 419211-5:2013 and is therefore a compliant signature creation device according to Article 30(3.(a)) (âCertification of qualified electronic signature creation devicesâ, 3.(a)) of eIDAS Regulation (Regulation No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014).'}, 'subcategory': 'Secure Signature Creation Devices (SSCD)'}}
.
- The following values were inserted:
-
24.03.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1148-V2-2023', 'BSI-DSZ-CC-1147-V2-2023']}}}
data.
- The report_references property was updated, with the
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
14f70b70f40894ea17a466d6d40c2345c3e3d8bdf3b060daf151f9c9f20fb3c9
. - The st_txt_hash property was set to
0628c85ad628a529609f0b766e7276401ddb137ac2516b87e5f3a21864c7e0f7
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 412068, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 84, '/Author': 'MaskTech International GmbH', '/CreationDate': "D:20180216153328+01'00'", '/Creator': 'LaTeX with hyperref package', '/Keywords': 'Common Criteria, CC, Machine Readable Travel Document, MRTD, Basic Access Control, BAC, ePass, MTCOS, EAL 4+', '/ModDate': "D:20180216154627+01'00'", '/PTEX.Fullbanner': 'This is pdfTeX, Version 3.14159265-2.6-1.40.15 (TeX Live 2014/Cygwin) kpathsea version 6.2.0', '/Producer': 'pdfTeX-1.40.15', '/Subject': 'Common Criteria Certification', '/Title': 'MTCOS Pro 2.5 ICAO - EAC with PACE / P60D145VB_J (P6022y VB) (BAC) - Security Target lite', '/Trapped': '/False', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0973-V2': 6}, 'NL': {'NSCIB-CC-15-67206-CR2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 2, 'BSI-CC-PP-0055': 2, 'BSI-CC-PP-0056': 1, 'BSI-CC-PP-0055-2009': 1, 'BSI-CC-PP-0056-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4': 10, 'EAL5': 2, 'EAL4 augmented': 4, 'EAL5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_FLR.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_INT.1': 2, 'ASE_CCL.1': 2, 'ASE_SPD.1': 2, 'ASE_OBJ.2': 2, 'ASE_ECD.1': 2, 'ASE_REQ.2': 2, 'ASE_TSS.1': 2, 'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 14, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_CKM.1': 32, 'FCS_CKM.2': 2, 'FCS_COP.1': 27, 'FCS_CKM.4': 27, 'FCS_CKM.1.1': 1, 'FCS_RND.1': 15, 'FCS_CKM.4.1': 1, 'FCS_COP': 59, 'FCS_RND.1.1': 1, 'FCS_RND.1.2': 1, 'FCS_RNG.1': 4, 'FCS_UID.1': 1}, 'FDP': {'FDP_ITC.1': 10, 'FDP_ITC.2': 5, 'FDP_ACC.1': 28, 'FDP_ACF.1': 20, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_UCT.1': 11, 'FDP_UIT.1': 11, 'FDP_IFC.1': 7, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ITC': 7, 'FDP_ITT.1': 3, 'FDP_SDC.1': 1, 'FDP_SDI.2': 1, 'FDP_RIP.1': 1, 'FDP_SOP.1': 4}, 'FIA': {'FIA_UAU.5.2': 4, 'FIA_UAU.4': 13, 'FIA_AFL.1': 8, 'FIA_UAU.6': 13, 'FIA_UID.1': 13, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 9, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 11, 'FIA_UAU.5.1': 1, 'FIA_UAU.6.1': 1, 'FIA_AFL.6': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_MTD': 25, 'FMT_MSA.3': 5, 'FMT_SMF.1': 27, 'FMT_SMR.1': 19, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_LIM.1': 19, 'FMT_LIM.2': 17, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 3, 'FMT_MTD.1': 5, 'FMT_MSA.1': 3}, 'FPT': {'FPT_FLS.1': 17, 'FPT_TST.1': 12, 'FPT_PHP.3': 17, 'FPT_RVM.1': 1, 'FPT_SEP.1': 1, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 3}, 'FRU': {'FRU_FLT.2': 4}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5}}, 'cc_claims': {'O': {'O.EEPROM_INTEGRITY': 3, 'O.TDES': 3, 'O.AES': 3, 'O.SW_AES': 3, 'O.MEM_ACCESS': 3, 'O.SFR_ACCESS': 3, 'O.RND': 1, 'O.CUST_RECONFIG_PLAIN': 1, 'O.FM_FW': 1, 'O.PUF': 1, 'O.SW_DES': 2, 'O.RSA': 1, 'O.ECDSA': 1, 'O.ECC_DHKE': 1, 'O.SHA': 1, 'O.COPY': 1, 'O.COMPARE': 1, 'O.REUSE': 1}, 'T': {'T.RND': 1}}, 'vendor': {'NXP': {'NXP Semiconductors': 4}, 'Gemalto': {'Gemalto': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 25}}, 'DES': {'DES': {'DES': 14}, '3DES': {'Triple-DES': 12, 'TDES': 13, '3DES': 3}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 5}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'Diffie-Hellman': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-224': 3, 'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 3, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 15}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 88}}, 'randomness': {'RNG': {'RND': 3, 'RNG': 11}}, 'cipher_mode': {'CBC': {'CBC': 11}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 4, 'physical probing': 7, 'DPA': 1}, 'FI': {'Physical Tampering': 5, 'physical tampering': 3, 'Physical tampering': 1, 'Malfunction': 14, 'malfunction': 8, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 29, 'EF.DG2': 9, 'EF.DG3': 8, 'EF.DG4': 7, 'EF.DG5': 7, 'EF.DG16': 27, 'EF.DG13': 3, 'EF.DG15': 2, 'EF.DG14': 3, 'EF.COM': 10, 'EF.SOD': 10}}, 'standard_id': {'FIPS': {'FIPS 180-4': 2, 'FIPS 46-3': 1, 'FIPS 140-2': 2, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 197': 1, 'FIPS PUB 46-3': 1}, 'BSI': {'AIS 31': 1}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 6, 'ISO/IEC 7816-2': 1, 'ISO/IEC 15946-3': 1, 'ISO/IEC 7816-4': 1, 'ISO/IEC 7816:2008': 1, 'ISO/IEC 9797:1999': 1}, 'ICAO': {'ICAO': 20}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
0996b_pdf.pdf
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1147-2020', 'BSI-DSZ-CC-1034-2019', 'BSI-DSZ-CC-1033-2019', 'BSI-DSZ-CC-1033-V2-2021', 'BSI-DSZ-CC-1034-V2-2021', 'BSI-DSZ-CC-1148-2020']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0996b_pdf.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1147-2020', 'BSI-DSZ-CC-1034-2019', 'BSI-DSZ-CC-1033-2019', 'BSI-DSZ-CC-1033-V2-2021', 'BSI-DSZ-CC-1148-2020', 'BSI-DSZ-CC-1034-V2-2021']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1034-V2-2021']}}}
data.
- The errors property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0996a_pdf.pdf, code: 408']
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1034-V2-2021']}}}
data.
- The errors property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
https://www.commoncriteriaportal.org/files/epfiles/0996c_pdf.pdf
.
The manufacturer_web was updated.
- The new value is
https://www.masktech.de/
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
14f70b70f40894ea17a466d6d40c2345c3e3d8bdf3b060daf151f9c9f20fb3c9
. - The st_txt_hash property was set to
0628c85ad628a529609f0b766e7276401ddb137ac2516b87e5f3a21864c7e0f7
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 412068, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 84, '/Author': 'MaskTech International GmbH', '/CreationDate': "D:20180216153328+01'00'", '/Creator': 'LaTeX with hyperref package', '/Keywords': 'Common Criteria, CC, Machine Readable Travel Document, MRTD, Basic Access Control, BAC, ePass, MTCOS, EAL 4+', '/ModDate': "D:20180216154627+01'00'", '/PTEX.Fullbanner': 'This is pdfTeX, Version 3.14159265-2.6-1.40.15 (TeX Live 2014/Cygwin) kpathsea version 6.2.0', '/Producer': 'pdfTeX-1.40.15', '/Subject': 'Common Criteria Certification', '/Title': 'MTCOS Pro 2.5 ICAO - EAC with PACE / P60D145VB_J (P6022y VB) (BAC) - Security Target lite', '/Trapped': '/False', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0973-V2': 6}, 'NL': {'NSCIB-CC-15-67206-CR2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 2, 'BSI-CC-PP-0055': 2, 'BSI-CC-PP-0056': 1, 'BSI-CC-PP-0055-2009': 1, 'BSI-CC-PP-0056-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4': 10, 'EAL5': 2, 'EAL4 augmented': 4, 'EAL5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_FLR.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_INT.1': 2, 'ASE_CCL.1': 2, 'ASE_SPD.1': 2, 'ASE_OBJ.2': 2, 'ASE_ECD.1': 2, 'ASE_REQ.2': 2, 'ASE_TSS.1': 2, 'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 14, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_CKM.1': 32, 'FCS_CKM.2': 2, 'FCS_COP.1': 27, 'FCS_CKM.4': 27, 'FCS_CKM.1.1': 1, 'FCS_RND.1': 15, 'FCS_CKM.4.1': 1, 'FCS_COP': 59, 'FCS_RND.1.1': 1, 'FCS_RND.1.2': 1, 'FCS_RNG.1': 4, 'FCS_UID.1': 1}, 'FDP': {'FDP_ITC.1': 10, 'FDP_ITC.2': 5, 'FDP_ACC.1': 28, 'FDP_ACF.1': 20, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_UCT.1': 11, 'FDP_UIT.1': 11, 'FDP_IFC.1': 7, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ITC': 7, 'FDP_ITT.1': 3, 'FDP_SDC.1': 1, 'FDP_SDI.2': 1, 'FDP_RIP.1': 1, 'FDP_SOP.1': 4}, 'FIA': {'FIA_UAU.5.2': 4, 'FIA_UAU.4': 13, 'FIA_AFL.1': 8, 'FIA_UAU.6': 13, 'FIA_UID.1': 13, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 9, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 11, 'FIA_UAU.5.1': 1, 'FIA_UAU.6.1': 1, 'FIA_AFL.6': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_MTD': 25, 'FMT_MSA.3': 5, 'FMT_SMF.1': 27, 'FMT_SMR.1': 19, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_LIM.1': 19, 'FMT_LIM.2': 17, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 3, 'FMT_MTD.1': 5, 'FMT_MSA.1': 3}, 'FPT': {'FPT_FLS.1': 17, 'FPT_TST.1': 12, 'FPT_PHP.3': 17, 'FPT_RVM.1': 1, 'FPT_SEP.1': 1, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 3}, 'FRU': {'FRU_FLT.2': 4}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5}}, 'cc_claims': {'O': {'O.EEPROM_INTEGRITY': 3, 'O.TDES': 3, 'O.AES': 3, 'O.SW_AES': 3, 'O.MEM_ACCESS': 3, 'O.SFR_ACCESS': 3, 'O.RND': 1, 'O.CUST_RECONFIG_PLAIN': 1, 'O.FM_FW': 1, 'O.PUF': 1, 'O.SW_DES': 2, 'O.RSA': 1, 'O.ECDSA': 1, 'O.ECC_DHKE': 1, 'O.SHA': 1, 'O.COPY': 1, 'O.COMPARE': 1, 'O.REUSE': 1}, 'T': {'T.RND': 1}}, 'vendor': {'NXP': {'NXP Semiconductors': 4}, 'Gemalto': {'Gemalto': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 25}}, 'DES': {'DES': {'DES': 14}, '3DES': {'Triple-DES': 12, 'TDES': 13, '3DES': 3}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 5}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'Diffie-Hellman': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-224': 3, 'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 3, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 15}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 88}}, 'randomness': {'RNG': {'RND': 3, 'RNG': 11}}, 'cipher_mode': {'CBC': {'CBC': 11}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 4, 'physical probing': 7, 'DPA': 1}, 'FI': {'Physical Tampering': 5, 'physical tampering': 3, 'Physical tampering': 1, 'Malfunction': 14, 'malfunction': 8, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 29, 'EF.DG2': 9, 'EF.DG3': 8, 'EF.DG4': 7, 'EF.DG5': 7, 'EF.DG16': 27, 'EF.DG13': 3, 'EF.DG15': 2, 'EF.DG14': 3, 'EF.COM': 10, 'EF.SOD': 10}}, 'standard_id': {'FIPS': {'FIPS 180-4': 2, 'FIPS 46-3': 1, 'FIPS 140-2': 2, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 197': 1, 'FIPS PUB 46-3': 1}, 'BSI': {'AIS 31': 1}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 6, 'ISO/IEC 7816-2': 1, 'ISO/IEC 15946-3': 1, 'ISO/IEC 7816-4': 1, 'ISO/IEC 7816:2008': 1, 'ISO/IEC 9797:1999': 1}, 'ICAO': {'ICAO': 20}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
0996b_pdf.pdf
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1148-2020']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values added.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The cert_link was updated.
- The new value is
None
.
The manufacturer_web was updated.
- The new value is
None
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'MRTD_ICAO_BA_V1.10', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0996b_pdf.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1148-2020']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values discarded.
- The new value is
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
14f70b70f40894ea17a466d6d40c2345c3e3d8bdf3b060daf151f9c9f20fb3c9
. - The st_txt_hash property was set to
0628c85ad628a529609f0b766e7276401ddb137ac2516b87e5f3a21864c7e0f7
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 412068, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 84, '/Author': 'MaskTech International GmbH', '/CreationDate': "D:20180216153328+01'00'", '/Creator': 'LaTeX with hyperref package', '/Keywords': 'Common Criteria, CC, Machine Readable Travel Document, MRTD, Basic Access Control, BAC, ePass, MTCOS, EAL 4+', '/ModDate': "D:20180216154627+01'00'", '/PTEX.Fullbanner': 'This is pdfTeX, Version 3.14159265-2.6-1.40.15 (TeX Live 2014/Cygwin) kpathsea version 6.2.0', '/Producer': 'pdfTeX-1.40.15', '/Subject': 'Common Criteria Certification', '/Title': 'MTCOS Pro 2.5 ICAO - EAC with PACE / P60D145VB_J (P6022y VB) (BAC) - Security Target lite', '/Trapped': '/False', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0973-V2': 6}, 'NL': {'NSCIB-CC-15-67206-CR2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 2, 'BSI-CC-PP-0055': 2, 'BSI-CC-PP-0056': 1, 'BSI-CC-PP-0055-2009': 1, 'BSI-CC-PP-0056-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4': 10, 'EAL5': 2, 'EAL4 augmented': 4, 'EAL5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_FLR.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_INT.1': 2, 'ASE_CCL.1': 2, 'ASE_SPD.1': 2, 'ASE_OBJ.2': 2, 'ASE_ECD.1': 2, 'ASE_REQ.2': 2, 'ASE_TSS.1': 2, 'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 14, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_CKM.1': 32, 'FCS_CKM.2': 2, 'FCS_COP.1': 27, 'FCS_CKM.4': 27, 'FCS_CKM.1.1': 1, 'FCS_RND.1': 15, 'FCS_CKM.4.1': 1, 'FCS_COP': 59, 'FCS_RND.1.1': 1, 'FCS_RND.1.2': 1, 'FCS_RNG.1': 4, 'FCS_UID.1': 1}, 'FDP': {'FDP_ITC.1': 10, 'FDP_ITC.2': 5, 'FDP_ACC.1': 28, 'FDP_ACF.1': 20, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_UCT.1': 11, 'FDP_UIT.1': 11, 'FDP_IFC.1': 7, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ITC': 7, 'FDP_ITT.1': 3, 'FDP_SDC.1': 1, 'FDP_SDI.2': 1, 'FDP_RIP.1': 1, 'FDP_SOP.1': 4}, 'FIA': {'FIA_UAU.5.2': 4, 'FIA_UAU.4': 13, 'FIA_AFL.1': 8, 'FIA_UAU.6': 13, 'FIA_UID.1': 13, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 9, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 11, 'FIA_UAU.5.1': 1, 'FIA_UAU.6.1': 1, 'FIA_AFL.6': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_MTD': 25, 'FMT_MSA.3': 5, 'FMT_SMF.1': 27, 'FMT_SMR.1': 19, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_LIM.1': 19, 'FMT_LIM.2': 17, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 3, 'FMT_MTD.1': 5, 'FMT_MSA.1': 3}, 'FPT': {'FPT_FLS.1': 17, 'FPT_TST.1': 12, 'FPT_PHP.3': 17, 'FPT_RVM.1': 1, 'FPT_SEP.1': 1, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 3}, 'FRU': {'FRU_FLT.2': 4}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5}}, 'cc_claims': {'O': {'O.EEPROM_INTEGRITY': 3, 'O.TDES': 3, 'O.AES': 3, 'O.SW_AES': 3, 'O.MEM_ACCESS': 3, 'O.SFR_ACCESS': 3, 'O.RND': 1, 'O.CUST_RECONFIG_PLAIN': 1, 'O.FM_FW': 1, 'O.PUF': 1, 'O.SW_DES': 2, 'O.RSA': 1, 'O.ECDSA': 1, 'O.ECC_DHKE': 1, 'O.SHA': 1, 'O.COPY': 1, 'O.COMPARE': 1, 'O.REUSE': 1}, 'T': {'T.RND': 1}}, 'vendor': {'NXP': {'NXP Semiconductors': 4}, 'Gemalto': {'Gemalto': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 25}}, 'DES': {'DES': {'DES': 14}, '3DES': {'Triple-DES': 12, 'TDES': 13, '3DES': 3}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 5}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'Diffie-Hellman': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-224': 3, 'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 3, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 15}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 88}}, 'randomness': {'RNG': {'RND': 3, 'RNG': 11}}, 'cipher_mode': {'CBC': {'CBC': 11}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 4, 'physical probing': 7, 'DPA': 1}, 'FI': {'Physical Tampering': 5, 'physical tampering': 3, 'Physical tampering': 1, 'Malfunction': 14, 'malfunction': 8, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 29, 'EF.DG2': 9, 'EF.DG3': 8, 'EF.DG4': 7, 'EF.DG5': 7, 'EF.DG16': 27, 'EF.DG13': 3, 'EF.DG15': 2, 'EF.DG14': 3, 'EF.COM': 10, 'EF.SOD': 10}}, 'standard_id': {'FIPS': {'FIPS 180-4': 2, 'FIPS 46-3': 1, 'FIPS 140-2': 2, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 197': 1, 'FIPS PUB 46-3': 1}, 'BSI': {'AIS 31': 1}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 6, 'ISO/IEC 7816-2': 1, 'ISO/IEC 15946-3': 1, 'ISO/IEC 7816-4': 1, 'ISO/IEC 7816:2008': 1, 'ISO/IEC 9797:1999': 1}, 'ICAO': {'ICAO': 20}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
0996b_pdf.pdf
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-0973-V2-2016']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
22.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0996b_pdf.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
21.12.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-0973-V2-2016']}}}
data.
- The report_references property was updated, with the
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The new value is
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
28.09.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2']}}}
data.
- The st_references property was updated, with the
-
26.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'crypto_protocol': {'__insert__': {'PGP': {'PGP': 2}}}}
data.
- The report_keywords property was updated, with the
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': '0996a_pdf.pdf', 'st_filename': '0996b_pdf.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0996-2018': 36}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 5}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_DVS.2': 5}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES-128': 3}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 1}}, '3DES': {'__update__': {'3DES': 11}}}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}, 'ICAO': {'__update__': {'ICAO': 11}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'__insert__': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC), SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile Machine Readable Travel Document with "ICAO Application" Basic Access': 1, 'VB, Certification ID BSI-DSZ-CC-0973-V2, version 1, 25.08.2016, TĂV Informationstechnik GmbH (confidential document) [17] Certification Report Crypto Library V3.1.x on P6022y VB, Report number NSCIB- CC-67206-CR2': 1, '11.2017, TĂV Rheinland Nederland B.V. (confidential document) [18] ETR for Composite Evaluation Crypto Library V3.1.x on P6022y VB EAL6+/5+, Certification ID': 1, 'Reference 17-RPT-421, version 3.0, 24.10.2017, Brightsight B.V., (confidential document) [19] Product data sheet, Secure high-performace smart card controller, SmartMX2 family P6022y VB': 1}, '__delete__': ['identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification', 'COS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC), SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile Machine Readable Travel Document with "ICAO Application" Basic Access', '6022y VB, Certification ID BSI-DSZ-CC-0973-V2, version 1, 25.08.2016, TĂV Informationstechnik GmbH (confidential document) [17] Certification Report Crypto Library V3.1.x on P6022y VB, Report number NSCIB- CC-67206-CR2', '17.11.2017, TĂV Rheinland Nederland B.V. (confidential document) [18] ETR for Composite Evaluation Crypto Library V3.1.x on P6022y VB EAL6+/5+, Certification ID', 'CC-17-67206, Reference 17-RPT-421, version 3.0, 24.10.2017, Brightsight B.V., (confidential document) [19] Product data sheet, Secure high-performace smart card controller, SmartMX2 family P6022y VB']}}}}
data. - The st_keywords property was updated, with the
{'cc_sar': {'__update__': {'ASE': {'__insert__': {'ASE_TSS.2': 1}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS.1': 14}}, 'FCS': {'__insert__': {'FCS_COP': 59}, '__update__': {'FCS_CKM.1': 32, 'FCS_COP.1': 27, 'FCS_CKM.4': 27}}, 'FDP': {'__insert__': {'FDP_ITC': 7, 'FDP_SOP.1': 4}, '__update__': {'FDP_ACC.1': 28, 'FDP_ACF.1': 20}}, 'FIA': {'__update__': {'FIA_UAU.4': 13, 'FIA_UAU.6': 13, 'FIA_UAU.1': 9, 'FIA_UAU.5.2': 4}}, 'FMT': {'__insert__': {'FMT_MTD': 25}, '__update__': {'FMT_MSA.3': 5, 'FMT_SMF.1': 27, 'FMT_SMR.1': 19, 'FMT_LIM.2': 17, 'FMT_MTD.1': 5, 'FMT_MSA.1': 3}}, 'FPT': {'__update__': {'FPT_TST.1': 12, 'FPT_PHP.3': 17}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.SW_DES': 2}, '__delete__': ['O.DF']}}, '__delete__': ['D']}, 'vendor': {'__update__': {'NXP': {'__delete__': ['NXP']}, 'Gemalto': {'__update__': {'Gemalto': 3}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 25}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 14}}, '3DES': {'__update__': {'Triple-DES': 12}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDSA': {'__update__': {'ECDSA': 5}}}}, 'FF': {'__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 7}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 15}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RND': 3}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 11}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'physical probing': 7}}, 'FI': {'__update__': {'Physical Tampering': 5, 'Malfunction': 14, 'malfunction': 8}}}}, 'tee_name': {'__update__': {'IBM': {'__delete__': ['SE']}}}, 'ic_data_group': {'__update__': {'EF': {'__update__': {'EF.DG1': 29, 'EF.DG4': 7, 'EF.DG16': 27, 'EF.SOD': 10}}}}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 20}}}}}
data.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1147-2020', 'BSI-DSZ-CC-1034-2019', 'BSI-DSZ-CC-1033-2019', 'BSI-DSZ-CC-1033-V2-2021', 'BSI-DSZ-CC-1034-V2-2021', 'BSI-DSZ-CC-1148-2020']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}]}
values added.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_ids': None}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'http://www.sogisportal.eu/']}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0996-2018': 64, 'BSI-DSZ-CC-0995-2018': 4, 'BSI-DSZ-CC-0973-V2-2016': 2, 'BSI-DSZ-CC-0973-V2': 9}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055-2009': 4, 'BSI-CC-PP- 0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL 5': 4, 'EAL 2': 3, 'EAL 1': 1, 'EAL5+': 1, 'EAL6': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 4, 'ALC_FLR': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_COMP.1': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP Semiconductors': 2, 'NXP': 6}, 'Gemalto': {'Gemalto': 1}}, 'eval_facility': {'BrightSight': {'Brightsight': 1}, 'TUV': {'TĂV Informationstechnik': 1}, 'SRC': {'SRC Security Research & Consulting': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES-128': 9, 'AES': 9}}, 'DES': {'DES': {'DES': 18}, '3DES': {'3DES': 17}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'PACE': {'PACE': 23}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}, 'FI': {'fault injection': 2}, 'other': {'JIL': 5}}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 36': 4, 'AIS 25': 2, 'AIS 31': 2, 'AIS 35': 2, 'AIS 20': 1, 'AIS 26': 1, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2, 'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2}, 'ICAO': {'ICAO': 15}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Readable Travel Document with âICAO Applicationâ Basic Access Control, MaskTech International GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0996-2018, Version 1.1 16.02.2018, Security Target - MTCOS Pro 2.5': 1, 'COS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC), SRC Security Research & Consulting GmbH (confidential document) [9] Protection Profile Machine Readable Travel Document with "ICAO Application" Basic Access': 1, '6022y VB, Certification ID BSI-DSZ-CC-0973-V2, version 1, 25.08.2016, TĂV Informationstechnik GmbH (confidential document) [17] Certification Report Crypto Library V3.1.x on P6022y VB, Report number NSCIB- CC-67206-CR2': 1, '17.11.2017, TĂV Rheinland Nederland B.V. (confidential document) [18] ETR for Composite Evaluation Crypto Library V3.1.x on P6022y VB EAL6+/5+, Certification ID': 1, 'CC-17-67206, Reference 17-RPT-421, version 3.0, 24.10.2017, Brightsight B.V., (confidential document) [19] Product data sheet, Secure high-performace smart card controller, SmartMX2 family P6022y VB': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0973-V2': 6}, 'NL': {'NSCIB-CC-15-67206-CR2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 2, 'BSI-CC-PP-0055': 2, 'BSI-CC-PP-0056': 1, 'BSI-CC-PP-0055-2009': 1, 'BSI-CC-PP-0056-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4': 10, 'EAL5': 2, 'EAL4 augmented': 4, 'EAL5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_FLR.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 1}, 'ASE': {'ASE_INT.1': 2, 'ASE_CCL.1': 2, 'ASE_SPD.1': 2, 'ASE_OBJ.2': 2, 'ASE_ECD.1': 2, 'ASE_REQ.2': 2, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 9, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG.1': 4, 'FCS_CKM.1': 29, 'FCS_CKM.2': 2, 'FCS_COP.1': 6, 'FCS_CKM.4': 25, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_RND.1': 15, 'FCS_RND.1.1': 1, 'FCS_RND.1.2': 1, 'FCS_UID.1': 1}, 'FDP': {'FDP_ITC.1': 10, 'FDP_ITC.2': 5, 'FDP_ACC.1': 22, 'FDP_ACF.1': 16, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_UCT.1': 11, 'FDP_UIT.1': 11, 'FDP_IFC.1': 7, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ITT.1': 3, 'FDP_SDC.1': 1, 'FDP_SDI.2': 1, 'FDP_RIP.1': 1}, 'FIA': {'FIA_UAU.4': 11, 'FIA_AFL.1': 8, 'FIA_UAU.6': 12, 'FIA_UID.1': 13, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 11, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 11, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 2, 'FIA_UAU.6.1': 1, 'FIA_AFL.6': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_MSA.3': 3, 'FMT_SMF.1': 25, 'FMT_SMR.1': 23, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_LIM.1': 19, 'FMT_LIM.2': 20, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 3, 'FMT_MTD.1': 1, 'FMT_MSA.1': 1}, 'FPT': {'FPT_FLS.1': 17, 'FPT_TST.1': 13, 'FPT_PHP.3': 16, 'FPT_RVM.1': 1, 'FPT_SEP.1': 1, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 3}, 'FRU': {'FRU_FLT.2': 4}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5}}, 'cc_claims': {'D': {'D.ICC': 1}, 'O': {'O.DF': 1, 'O.EEPROM_INTEGRITY': 3, 'O.TDES': 3, 'O.SW_DES': 3, 'O.AES': 3, 'O.SW_AES': 3, 'O.MEM_ACCESS': 3, 'O.SFR_ACCESS': 3, 'O.RND': 1, 'O.CUST_RECONFIG_PLAIN': 1, 'O.FM_FW': 1, 'O.PUF': 1, 'O.RSA': 1, 'O.ECDSA': 1, 'O.ECC_DHKE': 1, 'O.SHA': 1, 'O.COPY': 1, 'O.COMPARE': 1, 'O.REUSE': 1}, 'T': {'T.RND': 1}}, 'vendor': {'NXP': {'NXP Semiconductors': 4, 'NXP': 1}, 'Gemalto': {'Gemalto': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 36}}, 'DES': {'DES': {'DES': 51}, '3DES': {'Triple-DES': 13, 'TDES': 13, '3DES': 3}}, 'constructions': {'MAC': {'KMAC': 1, 'CMAC': 5}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 7}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'Diffie-Hellman': 4}, 'DSA': {'DSA': 7}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6}, 'SHA2': {'SHA-224': 3, 'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 3, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 44}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 88}}, 'randomness': {'RNG': {'RNG': 11, 'RND': 2}}, 'cipher_mode': {'CBC': {'CBC': 17}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 4, 'physical probing': 6, 'DPA': 1}, 'FI': {'Physical Tampering': 6, 'physical tampering': 3, 'Physical tampering': 1, 'Malfunction': 24, 'malfunction': 7, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 2, 'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 30, 'EF.DG2': 9, 'EF.DG3': 8, 'EF.DG4': 6, 'EF.DG5': 7, 'EF.DG16': 25, 'EF.DG13': 3, 'EF.DG15': 2, 'EF.DG14': 3, 'EF.COM': 10, 'EF.SOD': 9}}, 'standard_id': {'FIPS': {'FIPS 180-4': 2, 'FIPS 46-3': 1, 'FIPS 140-2': 2, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 197': 1, 'FIPS PUB 46-3': 1}, 'BSI': {'AIS 31': 1}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 6, 'ISO/IEC 7816-2': 1, 'ISO/IEC 15946-3': 1, 'ISO/IEC 7816-4': 1, 'ISO/IEC 7816:2008': 1, 'ISO/IEC 9797:1999': 1}, 'ICAO': {'ICAO': 28}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '44d099d6631059c38536a584bdd9a9aa5ec61d621d012f9d955910bcb03364f1', 'st_pdf_hash': '14f70b70f40894ea17a466d6d40c2345c3e3d8bdf3b060daf151f9c9f20fb3c9', 'report_txt_hash': '5261d52537a0dbb1e2e816aaf081ba1b68a801523a58c52dfed3dad748114c71', 'st_txt_hash': '0628c85ad628a529609f0b766e7276401ddb137ac2516b87e5f3a21864c7e0f7'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES-128': 9, 'AES': 9, '3DES': 17, 'DES': 1}, 'rules_asymmetric_crypto': {'ECC': 1, 'Diffie-Hellman': 1, 'DSA': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'PACE': 23, 'MAC': 1, 'Key Exchange': 1}, 'rules_randomness': {'RNG': 1}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'side channel': 1, 'fault injection': 2}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 36, 'DES': 35, 'TDES': 13, '3DES': 3, 'KMAC': 1}, 'rules_asymmetric_crypto': {'ECDSA': 7, 'ECC': 11, 'Diffie-Hellman': 4, 'DSA': 7}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 6, 'SHA-224': 3, 'SHA-256': 3, 'SHA-384': 3, 'SHA-512': 3}, 'rules_crypto_schemes': {'PACE': 88, 'MAC': 44}, 'rules_randomness': {'RNG': 11, 'RND': 2}, 'rules_tee': {'SSC': 2, 'SE': 1}, 'rules_side_channels': {'Malfunction': 24, 'malfunction': 7, 'Leak-Inherent': 4, 'physical probing': 6, 'Physical Tampering': 6, 'physical tampering': 3, 'Physical tampering': 1, 'DPA': 1, 'fault injection': 1, 'reverse engineering': 1}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2', 'NSCIB-CC-15-67206-CR2']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2', 'NSCIB-CC-15-67206-CR2']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1001-2018', 'BSI-DSZ-CC-0995-2018']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0995-2018', 'BSI-DSZ-CC-1065-2020', 'BSI-DSZ-CC-0996-2018', 'BSI-DSZ-CC-1001-2018', 'BSI-DSZ-CC-1036-2019', 'BSI-DSZ-CC-1064-2020']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2', 'BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0995-2018']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0995-2018', 'BSI-DSZ-CC-0973-V2', 'BSI-DSZ-CC-0996-2018', 'BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0973-2016']}}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['2.5']}
. - The directly_affected_by property was set to
{'_type': 'Set', 'elements': ['BSI-DSZ-CC-1001-2018', 'BSI-DSZ-CC-0995-2018']}
.
- The report_frontpage property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/0996c_pdf.pdf",
"dgst": "3a3ae16e94bc7aba",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0996-2018",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.5"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0995-2018",
"BSI-DSZ-CC-1001-2018"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0973-V2-2016",
"BSI-DSZ-CC-0995-2018"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1148-V3-2023",
"BSI-DSZ-CC-1065-2020",
"BSI-DSZ-CC-1064-2020",
"BSI-DSZ-CC-1211-2023",
"BSI-DSZ-CC-1147-V3-2023",
"BSI-DSZ-CC-1034-V2-2021",
"BSI-DSZ-CC-1148-2020",
"BSI-DSZ-CC-1033-V2-2021",
"BSI-DSZ-CC-1148-V2-2023",
"BSI-DSZ-CC-1034-2019",
"BSI-DSZ-CC-1036-2019",
"BSI-DSZ-CC-1033-2019",
"BSI-DSZ-CC-0996-2018",
"BSI-DSZ-CC-1147-V2-2023",
"BSI-DSZ-CC-0995-2018",
"BSI-DSZ-CC-1001-2018",
"BSI-DSZ-CC-1147-2020"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0996-2018",
"BSI-DSZ-CC-0973-2016",
"BSI-DSZ-CC-0973-V2-2016",
"BSI-DSZ-CC-0995-2018"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "MaskTech International GmbH",
"manufacturer_web": "https://www.masktech.de/",
"name": "MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC)",
"not_valid_after": "2023-04-30",
"not_valid_before": "2018-04-30",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "0996c_pdf.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0996-2018": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055-2009": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20180507120459+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, MRTD, EAC, BAC, PACE, Reisepass, ePassport, Extended Access Control, MTCOS, MaskTech\"",
"/ModDate": "D:20180524131239+02\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC)",
"/Title": "Certificate BSI-DSZ-CC-0996-2018",
"pdf_file_size_bytes": 360655,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "0996a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0996-2018",
"cert_item": "MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC",
"cert_lab": "BSI",
"developer": "MaskTech International GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Machine Readable Travel Document with \"ICAO Application\" Basic Access Control, Version 1.10, 25 March 2009, BSI-CC-PP-0055-2009"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0973-V2-2016": 1,
"BSI-DSZ-CC-0995-2018": 2,
"BSI-DSZ-CC-0996-2018": 18,
"BSI-DSZ-CC-1001-": 1,
"BSI-DSZ-CC-S-0064-2016": 1,
"BSI-DSZ-CC-S-0073-2016": 1
},
"NL": {
"CC-17-67206": 3,
"CC-67206-CR2": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0055-2009": 1,
"BSI-CC-PP-0055-2009": 4
}
},
"cc_sar": {
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_COMP.1": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 5,
"ALC_FLR": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 3,
"EAL 4": 5,
"EAL 4 augmented": 3,
"EAL 5": 4,
"EAL 5+": 1,
"EAL 6": 1,
"EAL5+": 1,
"EAL6": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"11.2017, T\u00dcV Rheinland Nederland B.V. (confidential document) [18] ETR for Composite Evaluation Crypto Library V3.1.x on P6022y VB EAL6+/5+, Certification ID": 1,
"Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC), SRC Security Research \u0026 Consulting GmbH (confidential document) [9] Protection Profile Machine Readable Travel Document with \"ICAO Application\" Basic Access": 1,
"Readable Travel Document with \u201cICAO Application\u201d Basic Access Control, MaskTech International GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0996-2018, Version 1.1 16.02.2018, Security Target - MTCOS Pro 2.5": 1,
"Reference 17-RPT-421, version 3.0, 24.10.2017, Brightsight B.V., (confidential document) [19] Product data sheet, Secure high-performace smart card controller, SmartMX2 family P6022y VB": 1,
"VB, Certification ID BSI-DSZ-CC-0973-V2, version 1, 25.08.2016, T\u00dcV Informationstechnik GmbH (confidential document) [17] Certification Report Crypto Library V3.1.x on P6022y VB, Report number NSCIB- CC-67206-CR2": 1,
"being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX2": 1
}
},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 23
},
"PGP": {
"PGP": 2
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
},
"SRC": {
"SRC Security Research \u0026 Consulting": 3
},
"TUV": {
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 2
},
"SCA": {
"side channel": 1
},
"other": {
"JIL": 5
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 25": 2,
"AIS 26": 1,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 4,
"AIS 38": 1
},
"ICAO": {
"ICAO": 11
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 7816": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 9,
"AES-128": 3
}
},
"DES": {
"3DES": {
"3DES": 11
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 1
},
"NXP": {
"NXP": 6,
"NXP Semiconductors": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20180507120438+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, MRTD, EAC, BAC, PACE, Reisepass, ePassport, Extended Access Control, MTCOS, MaskTech\"",
"/ModDate": "D:20180507130521+02\u002700\u0027",
"/Producer": "LibreOffice 5.2",
"/Subject": "MTCOS Pro 2.5 EAC with PACE / P60D145VB_J (P6022y VB) (BAC)",
"/Title": "Certification Report BSI-DSZ-CC-0996-2018",
"pdf_file_size_bytes": 784691,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/zertifizierungsreporte",
"http://www.commoncriteriaportal.org/cc/",
"http://www.sogisportal.eu/",
"https://www.bsi.bund.de/AIS",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
},
"st_filename": "0996b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 11
},
"ECDSA": {
"ECDSA": 5
}
},
"FF": {
"DH": {
"Diffie-Hellman": 4
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0995": 2,
"BSI-DSZ-CC-0996": 1,
"BSI-DSZ-CC-1001": 1,
"BSI-DSZ-CC-S-0064-2016": 1,
"BSI-DSZ-CC-S-0073-2016": 1,
"BSI-DSZ-CC-S-0097-2017": 1
},
"NL": {
"CC-17-67206": 1,
"NSCIB-CC-15-67206-CR2": 1
}
},
"cc_claims": {
"O": {
"O.AES": 3,
"O.COMPARE": 1,
"O.COPY": 1,
"O.CUST_RECONFIG_PLAIN": 1,
"O.ECC_DHKE": 1,
"O.ECDSA": 1,
"O.EEPROM_INTEGRITY": 3,
"O.FM_FW": 1,
"O.MEM_ACCESS": 3,
"O.PUF": 1,
"O.REUSE": 1,
"O.RND": 1,
"O.RSA": 1,
"O.SFR_ACCESS": 3,
"O.SHA": 1,
"O.SW_AES": 3,
"O.SW_DES": 2,
"O.TDES": 3
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055": 2,
"BSI-CC-PP-0055-2009": 1,
"BSI-CC-PP-0056": 1,
"BSI-CC-PP-0056-2009": 1,
"BSI-CC-PP-0084-2014": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 7,
"ALC_FLR.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 2,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 10,
"EAL4 augmented": 4,
"EAL5": 2,
"EAL5 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 14,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 32,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 27,
"FCS_CKM.4.1": 1,
"FCS_COP": 59,
"FCS_COP.1": 27,
"FCS_RND.1": 15,
"FCS_RND.1.1": 1,
"FCS_RND.1.2": 1,
"FCS_RNG.1": 4,
"FCS_UID.1": 1
},
"FDP": {
"FDP_ACC.1": 28,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 20,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 7,
"FDP_ITC": 7,
"FDP_ITC.1": 10,
"FDP_ITC.2": 5,
"FDP_ITT.1": 3,
"FDP_RIP.1": 1,
"FDP_SDC.1": 1,
"FDP_SDI.2": 1,
"FDP_SOP.1": 4,
"FDP_UCT.1": 11,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 11,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_AFL.6": 1,
"FIA_UAU.1": 9,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 13,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 11,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 4,
"FIA_UAU.6": 13,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 13,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM.1": 19,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 17,
"FMT_LIM.2.1": 3,
"FMT_MSA.1": 3,
"FMT_MSA.3": 5,
"FMT_MTD": 25,
"FMT_MTD.1": 5,
"FMT_SMF.1": 27,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 19,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 17,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 3,
"FPT_PHP.3": 17,
"FPT_PHP.3.1": 1,
"FPT_RVM.1": 1,
"FPT_SEP.1": 1,
"FPT_TST.1": 12,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 2
},
"FRU": {
"FRU_FLT.2": 4
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_TRP.1": 5
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 11
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 88
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 15
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 7
},
"SHA2": {
"SHA-2": 1,
"SHA-224": 3,
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 10,
"EF.DG1": 29,
"EF.DG13": 3,
"EF.DG14": 3,
"EF.DG15": 2,
"EF.DG16": 27,
"EF.DG2": 9,
"EF.DG3": 8,
"EF.DG4": 7,
"EF.DG5": 7,
"EF.SOD": 10
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 3,
"RNG": 11
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 14,
"Physical Tampering": 5,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 8,
"physical tampering": 3
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 4,
"physical probing": 7
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS 31": 1
},
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
},
"FIPS": {
"FIPS 140-2": 2,
"FIPS 180-4": 2,
"FIPS 46-3": 1,
"FIPS PUB 140-2": 1,
"FIPS PUB 180-4": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1
},
"ICAO": {
"ICAO": 20
},
"ISO": {
"ISO/IEC 14443": 6,
"ISO/IEC 15946-3": 1,
"ISO/IEC 7816": 2,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-4": 1,
"ISO/IEC 7816:2008": 1,
"ISO/IEC 9797:1999": 1
},
"RFC": {
"RFC3369": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 25
}
},
"DES": {
"3DES": {
"3DES": 3,
"TDES": 13,
"Triple-DES": 12
},
"DES": {
"DES": 14
}
},
"constructions": {
"MAC": {
"CMAC": 5,
"KMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 2
}
},
"tls_cipher_suite": {},
"vendor": {
"Gemalto": {
"Gemalto": 3
},
"NXP": {
"NXP Semiconductors": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "MaskTech International GmbH",
"/CreationDate": "D:20180216153328+01\u002700\u0027",
"/Creator": "LaTeX with hyperref package",
"/Keywords": "Common Criteria, CC, Machine Readable Travel Document, MRTD, Basic Access Control, BAC, ePass, MTCOS, EAL 4+",
"/ModDate": "D:20180216154627+01\u002700\u0027",
"/PTEX.Fullbanner": "This is pdfTeX, Version 3.14159265-2.6-1.40.15 (TeX Live 2014/Cygwin) kpathsea version 6.2.0",
"/Producer": "pdfTeX-1.40.15",
"/Subject": "Common Criteria Certification",
"/Title": "MTCOS Pro 2.5 ICAO - EAC with PACE / P60D145VB_J (P6022y VB) (BAC) - Security Target lite",
"/Trapped": "/False",
"pdf_file_size_bytes": 412068,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 84
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": null,
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf",
"pp_name": "Protection Profile for Machine Readable Travel Document with \u0027ICAO Application\u0027, Basic Acce..."
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/0996a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/0996b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "261dd9f4cfd896df3a237959790a4fec03b3a97260895309dfa8d4ff33ebaec2",
"txt_hash": "277abf6b07d664578fdcfb9cfee13519bf1f198369ed77d1fbbb694b795ac1d2"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "44d099d6631059c38536a584bdd9a9aa5ec61d621d012f9d955910bcb03364f1",
"txt_hash": "5261d52537a0dbb1e2e816aaf081ba1b68a801523a58c52dfed3dad748114c71"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "14f70b70f40894ea17a466d6d40c2345c3e3d8bdf3b060daf151f9c9f20fb3c9",
"txt_hash": "0628c85ad628a529609f0b766e7276401ddb137ac2516b87e5f3a21864c7e0f7"
}
},
"status": "archived"
}