This page was not yet optimized for use on mobile devices.
SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4)
CSV information ?
Status | active |
---|---|
Valid from | 15.09.2023 |
Valid until | 15.09.2028 |
Scheme | 🇪🇸 ES |
Manufacturer | HID Global |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, EAL5+, ALC_DVS.2 |
Protection profiles |
Heuristics summary ?
Certificate ID: 2021-44-INF-4142
Certificate ?
Extracted keywords
Security level
EAL 2Security Assurance Requirements (SAR)
ALC_FLR, ALC_DVS.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01Evaluation facilities
Applus LaboratoriesStandards
ICAOFile metadata
Creation date: | D:20230904141112+02'00' |
---|---|
Modification date: | D:20230904141112+02'00' |
Pages: | 1 |
Producer: | GPL Ghostscript 9.27 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, Triple-DESHash functions
SHA-512Protocols
PACEVendor
InfineonSecurity level
EAL5, EAL5+, EAL6, EAL6+, EAL 1, EAL 4, EAL 2, EAL2, EAL6 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.4, ADV_ARC, AGD_OPE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_TAT.2, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2Protection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0068-V2Certificates
BSI-DSZ-CC-0891-V6-2021, 2021-44-INF-4142- v1Evaluation facilities
Applus LaboratoriesSide-channel analysis
JILStandards
ICAOTechnical reports
BSI TR-03110File metadata
Author: | 9308 |
---|---|
Creation date: | D:20230918155842+02'00' |
Modification date: | D:20230918155842+02'00' |
Pages: | 17 |
Creator: | Microsoft® Word LTSC |
Producer: | Microsoft® Word LTSC |
References
Outgoing- BSI-DSZ-CC-0891-V6-2021 - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDES, TDEA, KMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-512, SHA-256, SHA-224, SHA-2Schemes
MAC, Key AgreementProtocols
PACERandomness
TRNG, RNGLibraries
Crypto Library v2.02.010Elliptic Curves
brainpoolP320r1, brainpoolP320t1Block cipher modes
ECB, CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG15, EF.DG13, EF.COM, EF.CardAccess, EF.SODTrusted Execution Environments
SSCVendor
Infineon, Infineon Technologies AGSecurity level
EAL5+, EAL6+, EAL 5, EAL5, EAL6, EAL6 augmentedSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, ADV_ARC, ADV_FSP, ADV_TDS, ADV_IMP, AGD_PRE.1, AGD_OPE.1, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_DEL.1, ALC_CMC.4, ALC_CMS.5, ALC_LCD.1, ALC_TAT.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ALC_FLR.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.3, AVA_VAN.5, AVA_VAN, APE_SRE, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_RND.1, FCS_COP.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.2, FCS_CKM.4.1, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_UCT, FDP_UIT, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.4, FDP_RIP.1.1, FDP_UCT.1, FDP_IFC.1, FDP_UIT.1, FDP_ITC, FIA_API, FIA_AFL, FIA_UID, FIA_UAU, FIA_UAU.5, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU.4, FIA_UAU.6, FIA_AFL.1, FIA_UAU.1, FIA_UID.1, FIA_UAU.4.1, FIA_ACC.1.1, FMT_LIM, FMT_SMF.1, FMT_SMR, FMT_LIM.1, FMT_LIM.2, FMT_MTD, FMT_MTD.3, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1.1, FMT_MTD.1, FMT_MTD.3.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_EMS.1.2, FPT_EMS.1.1, FPT_ITC, FPT_FLS, FPT_FLS.1.1, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01Certificates
BSI-DSZ-CC-0891-V6-2021Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, Physical tampering, physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS PUB 180-4, FIPS 46-3, FIPS 19747, FIPS 197, FIPS 186-4, FIPS 180-4, FIPS PUB 186-4, FIPS PUB 197, NIST SP 800-67, SP 800-38A, NIST SP 800-38A, PKCS#3, PKCS#1, PKCS #3, AIS 31, RFC2119, RFC 2631, RFC3369, ISO/IEC 7816-2, ISO/IEC 9796-, ISO/IEC 14443, ISO/IEC 7816-4, ICAOTechnical reports
BSI TR-03110, BSI TR-03111File metadata
Title: | Security Target SOMA-c007 Machine Readable Electronic Document - ICAO Application - EAC-PACE-AA |
---|---|
Subject: | SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA |
Author: | Giovanni LICCARDO, Roberta SODANO |
Creation date: | D:20230512120431+02'00' |
Modification date: | D:20230512120431+02'00' |
Pages: | 176 |
Creator: | Microsoft® Word per Microsoft 365 |
Producer: | Microsoft® Word per Microsoft 365 |
References
Outgoing- BSI-DSZ-CC-0891-V6-2021 - Infineon Security Controller M7892 Design Steps D11 and G12, with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE) Infineon Security Controller M7892 Design Steps D11 and G12, with the optional libraries RSA2048/4096 v2.03.008 or v2.07.003, EC v2.03.008 or v2.07.003, SHA-2 v1.01, Toolbox v2.03.008 or v2.07.003 and symmetric crypto library v2.02.010, as well as with specific IC dedicated firmware, including the Flash Loader enhanced by the Mutual Authentication Extension (MAE)
Heuristics ?
Certificate ID: 2021-44-INF-4142
Extracted SARs
ASE_SPD.1, ADV_TDS.4, AGD_PRE.1, ALC_DVS.2, ASE_ECD.1, ASE_TSS.1, ALC_CMC.4, ALC_LCD.1, ADV_FSP.5, ALC_TAT.2, ADV_ARC.1, ASE_REQ.2, ALC_DEL.1, ATE_COV.2, ASE_CCL.1, ASE_INT.1, AGD_OPE.1, ATE_DPT.3, ATE_FUN.1, ADV_IMP.1, AVA_VAN.5, ATE_IND.2, ALC_FLR.1, ASE_OBJ.2, ALC_CMS.5, ADV_INT.2Scheme data ?
Product | SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4) | |
---|---|---|
Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/992-soma-c007-machine-readable-electronic-document-eac-pace-aa-version-4-soma-c007-4 | |
Category | Smart Cards and similiar devices | |
Manufacturer | Hid Global | |
Certification Date | 2023-09-15 |
References ?
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e22f9c622640cf465144615e778aecc6a0e24f7033e72836e075298563d9d6bf', 'txt_hash': 'c0dde2bddf764d4344c3c7f5c0d5cfdc725b0813c58d4baa7c6642d269dd54b5'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3d6e8ef40408e0bfed169b0c782ae165c4eeb931ae3df031ead1d4c262286f4f', 'txt_hash': '2996a49669ce171d2272cdd3280905069a12261237f6aed11cd79c1409c69b1c'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5eaa8af91641aa69d03ae45f5b6f77e46b9a1d79eb28dd03772ea14113f3d381', 'txt_hash': '2a4a62a8d09fdba3a19fcc2b4322b01afae95b343b6b3d4676cc6ed83632370d'}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': {'pdf_file_size_bytes': 509376, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Producer': 'GPL Ghostscript 9.27', '/CreationDate': "D:20230904141112+02'00'", '/ModDate': "D:20230904141112+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 1}}, 'cc_security_level': {'EAL': {'EAL 2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1, 'ALC_DVS.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Applus': {'Applus Laboratories': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '2021-44_Certificado.pdf'}
. - The report_frontpage property was set to
{}
. - The st_frontpage property was set to
None
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0891-V6-2021': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0891-V6-2021': 2}}}}}
data.
The computed heuristics were updated.
- The cert_lab property was set to
None
.
- The following values were inserted:
-
13.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0891-V6-2021': 2}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0891-V6-2021': 4}}}}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0891-V6-2021': 1}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0891-V6-2021': 2}}}}}
data.
- The report_keywords property was updated, with the
-
08.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4)', 'product_link': 'https://oc.ccn.cni.es/en/certified-products/certified-products/992-soma-c007-machine-readable-electronic-document-eac-pace-aa-version-4-soma-c007-4', 'category': 'Smart Cards and similiar devices', 'manufacturer': 'Hid Global', 'certification_date': '2023-09-15'}
.
- The scheme_data property was set to
-
05.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
.
- The following values were inserted:
-
21.09.2023 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/files/epfiles/2021-44_Certificado.pdf",
"dgst": "3c431b7bcb548458",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "2021-44-INF-4142",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V6-2021"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V4-2019",
"BSI-DSZ-CC-0891-2015",
"BSI-DSZ-CC-0891-V3-2018",
"BSI-DSZ-CC-0891-V6-2021",
"BSI-DSZ-CC-0891-V2-2016",
"BSI-DSZ-CC-0782-2012"
]
}
},
"scheme_data": {
"category": "Smart Cards and similiar devices",
"certification_date": "2023-09-15",
"manufacturer": "Hid Global",
"product": "SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4)",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/992-soma-c007-machine-readable-electronic-document-eac-pace-aa-version-4-soma-c007-4"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V6-2021"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0891-V6-2021"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "HID Global",
"manufacturer_web": "https://www.hidglobal.com/",
"name": "SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4)",
"not_valid_after": "2028-09-15",
"not_valid_before": "2023-09-15",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "2021-44_Certificado.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-V2-2012": 1,
"BSI-CC-PP-0068-V2-2011-MA-01": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ICAO": {
"ICAO": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20230904141112+02\u002700\u0027",
"/ModDate": "D:20230904141112+02\u002700\u0027",
"/Producer": "GPL Ghostscript 9.27",
"pdf_file_size_bytes": 509376,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "2021-44 INF-4142.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0891-V6-2021": 1
},
"ES": {
"2021-44-INF-4142- v1": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-V2-2012": 2,
"BSI-CC-PP-0068-V2": 1,
"BSI-CC-PP-0068-V2-2011-MA-01": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_IMP.1": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DVS.2": 9,
"ALC_FLR": 3,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 9
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 1,
"EAL5": 8,
"EAL5+": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 10
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 7
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 1
}
},
"standard_id": {
"ICAO": {
"ICAO": 20
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"3DES": {
"Triple-DES": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "9308",
"/CreationDate": "D:20230918155842+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word LTSC",
"/ModDate": "D:20230918155842+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word LTSC",
"pdf_file_size_bytes": 393202,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.sogis.eu/",
"http://www.commoncriteriaportal.org/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "2021-44 ST_LITE.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 20
},
"ECDSA": {
"ECDSA": 10
}
},
"FF": {
"DH": {
"DH": 12,
"Diffie-Hellman": 22
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0891-V6-2021": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-V2-2012": 2,
"BSI-CC-PP-0068-V2-2011-MA-01": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 4,
"ADV_FSP": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_IMP": 1,
"ADV_IMP.1": 3,
"ADV_INT.2": 2,
"ADV_TDS": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 3,
"AGD_PRE": 1,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.4": 2,
"ALC_CMS": 1,
"ALC_CMS.5": 2,
"ALC_DEL": 1,
"ALC_DEL.1": 3,
"ALC_DVS": 1,
"ALC_DVS.2": 6,
"ALC_FLR.1": 1,
"ALC_LCD": 1,
"ALC_LCD.1": 2,
"ALC_TAT": 1,
"ALC_TAT.2": 2
},
"APE": {
"APE_SRE": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT.1": 1,
"ATE_DPT.3": 2,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.3": 2,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL5": 5,
"EAL5+": 3,
"EAL6": 2,
"EAL6 augmented": 1,
"EAL6+": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 7,
"FAU_SAS.1": 14,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 61,
"FCS_CKM.1": 24,
"FCS_CKM.2": 9,
"FCS_CKM.4": 56,
"FCS_CKM.4.1": 1,
"FCS_COP": 91,
"FCS_COP.1": 16,
"FCS_RND": 7,
"FCS_RND.1": 20,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC": 20,
"FDP_ACC.1": 9,
"FDP_ACF": 21,
"FDP_ACF.1": 16,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 4,
"FDP_ITC": 1,
"FDP_ITC.1": 16,
"FDP_ITC.2": 16,
"FDP_RIP.1": 14,
"FDP_RIP.1.1": 1,
"FDP_UCT": 10,
"FDP_UCT.1": 3,
"FDP_UIT": 10,
"FDP_UIT.1": 4
},
"FIA": {
"FIA_ACC.1.1": 1,
"FIA_AFL": 32,
"FIA_AFL.1": 9,
"FIA_API": 36,
"FIA_API.1": 7,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU": 105,
"FIA_UAU.1": 13,
"FIA_UAU.4": 6,
"FIA_UAU.4.1": 2,
"FIA_UAU.5": 10,
"FIA_UAU.6": 6,
"FIA_UID": 23,
"FIA_UID.1": 8
},
"FMT": {
"FMT_LIM": 7,
"FMT_LIM.1": 25,
"FMT_LIM.1.1": 3,
"FMT_LIM.2": 22,
"FMT_LIM.2.1": 4,
"FMT_MSA.1": 2,
"FMT_MSA.3": 4,
"FMT_MTD": 91,
"FMT_MTD.1": 18,
"FMT_MTD.3": 13,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 49,
"FMT_SMF.1.1": 1,
"FMT_SMR": 30,
"FMT_SMR.1": 21
},
"FPT": {
"FPT_EMS": 7,
"FPT_EMS.1": 16,
"FPT_EMS.1.1": 4,
"FPT_EMS.1.2": 5,
"FPT_FLS": 1,
"FPT_FLS.1": 10,
"FPT_FLS.1.1": 1,
"FPT_ITC": 1,
"FPT_PHP.3": 13,
"FPT_PHP.3.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 12,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 2
},
"FTP": {
"FTP_ITC": 25,
"FTP_ITC.1": 11,
"FTP_TRP.1": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 8
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Generic": {
"Crypto Library v2.02.010": 2
}
},
"crypto_protocol": {
"PACE": {
"PACE": 228
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"MAC": {
"MAC": 21
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP320r1": 3,
"brainpoolP320t1": 3
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 5
},
"SHA2": {
"SHA-2": 3,
"SHA-224": 1,
"SHA-256": 12,
"SHA-512": 1
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 1,
"EF.CardAccess": 1,
"EF.DG1": 13,
"EF.DG13": 1,
"EF.DG14": 11,
"EF.DG15": 7,
"EF.DG16": 10,
"EF.DG2": 5,
"EF.DG3": 13,
"EF.DG4": 12,
"EF.DG5": 3,
"EF.SOD": 6
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
},
"TRNG": {
"TRNG": 2
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 4,
"Physical Tampering": 3,
"Physical tampering": 2,
"fault injection": 2,
"malfunction": 6,
"physical tampering": 1
},
"SCA": {
"DPA": 3,
"SPA": 2,
"physical probing": 3,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS 31": 1
},
"FIPS": {
"FIPS 180-4": 1,
"FIPS 186-4": 1,
"FIPS 197": 1,
"FIPS 19747": 1,
"FIPS 46-3": 6,
"FIPS PUB 180-4": 2,
"FIPS PUB 186-4": 1,
"FIPS PUB 197": 1
},
"ICAO": {
"ICAO": 65
},
"ISO": {
"ISO/IEC 14443": 4,
"ISO/IEC 7816-2": 3,
"ISO/IEC 7816-4": 1,
"ISO/IEC 9796-": 1
},
"NIST": {
"NIST SP 800-38A": 2,
"NIST SP 800-67": 3,
"SP 800-38A": 1
},
"PKCS": {
"PKCS #3": 2,
"PKCS#1": 3,
"PKCS#3": 11
},
"RFC": {
"RFC 2631": 1,
"RFC2119": 1,
"RFC3369": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 32
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 1,
"Triple-DES": 38
},
"DES": {
"DES": 7
}
},
"constructions": {
"MAC": {
"CMAC": 6,
"KMAC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 5,
"BSI TR-03111": 4
}
},
"tee_name": {
"IBM": {
"SSC": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 13,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Giovanni LICCARDO, Roberta SODANO",
"/CreationDate": "D:20230512120431+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word per Microsoft 365",
"/ModDate": "D:20230512120431+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word per Microsoft 365",
"/Subject": "SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA",
"/Title": "Security Target SOMA-c007 Machine Readable Electronic Document - ICAO Application - EAC-PACE-AA",
"pdf_file_size_bytes": 2080137,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 176
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"MRTD_SAC_PACEV2_V1.0",
"EPASS_V1.0",
"EPASS_PACE_V1.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf",
"pp_name": "Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)"
},
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4",
"pp_ids": {
"_type": "Set",
"elements": [
"MRTD-PP_V1.10",
"MRTD_ICAO_EAC_V1.3"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf",
"pp_name": "Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/2021-44%20INF-4142.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ALC_DVS.2",
"EAL5+"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/2021-44%20ST_LITE.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5eaa8af91641aa69d03ae45f5b6f77e46b9a1d79eb28dd03772ea14113f3d381",
"txt_hash": "2a4a62a8d09fdba3a19fcc2b4322b01afae95b343b6b3d4676cc6ed83632370d"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e22f9c622640cf465144615e778aecc6a0e24f7033e72836e075298563d9d6bf",
"txt_hash": "c0dde2bddf764d4344c3c7f5c0d5cfdc725b0813c58d4baa7c6642d269dd54b5"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3d6e8ef40408e0bfed169b0c782ae165c4eeb931ae3df031ead1d4c262286f4f",
"txt_hash": "2996a49669ce171d2272cdd3280905069a12261237f6aed11cd79c1409c69b1c"
}
},
"status": "active"
}