Xaica-Alpha PLUS ePassport on MTCOS Pro 2.5 with SAC (BAC+PACE) and Active Authentication / ST31G480 D01

CSV information ?

Status active
Valid from 30.07.2020
Valid until 30.07.2025
Scheme 🇩🇪 DE
Manufacturer MaskTech International GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, ALC_DVS.2

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1074-V2-2020

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES
Asymmetric Algorithms
ECC, Diffie-Hellman, DSA
Schemes
MAC, Key Exchange
Protocols
PACE, PGP
Randomness
RNG
Libraries
NesLib 6.2.1, NESLIB v6.2.1
Block cipher modes
CBC

Vendor
STMicroelectronics, STM

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL5+, EAL6, EAL 5+, EAL 6, EAL 4 augmented
Claims
OE.PKI
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_COMP.1
Certificates
BSI-DSZ-CC-1074-2019, BSI-DSZ-CC-1074-V2-2020, BSI-DSZ-CC-1073-V2, BSI-DSZ-CC-1074-V2, ANSSI-CC-2019/12
Evaluation facilities
Serma Safety & Security, SRC Security Research & Consulting
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Pro 2.5 with SAC (BAC+PACE) and Active Authentication / ST31G480 D01, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1074-V2-2020, Version1.1, 17.07.2020, Xaica-α PLUS ePassport, Evaluation Technical Report (ETR) BSI-DSZ-CC-1074-V2, SRC Security Research & Consulting GmbH (confidential document) [9] JISEC C0500, version 1.00, Protection Profile for ePassport IC with SAC (BAC+PACE) and Active, PLUS ePassport, BSI-DSZ-CC-1073-V2/1074-V2, MaskTech International GmbH, Version 0.5, 17.07.2020 (confidential document) [11] Xaica-α PLUS ePassport – User Guidance, BSI-DSZ-CC-1073-V2/1074-V2, MaskTech International

Side-channel analysis
fault injection, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Pro 2.5 with SAC (BAC+PACE) and Active Authentication / ST31G480 D01, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1074-V2-2020, Version1.1, 17.07.2020, Xaica-α PLUS ePassport, Evaluation Technical Report (ETR) BSI-DSZ-CC-1074-V2, SRC Security Research & Consulting GmbH (confidential document) [9] JISEC C0500, version 1.00, Protection Profile for ePassport IC with SAC (BAC+PACE) and Active, PLUS ePassport, BSI-DSZ-CC-1073-V2/1074-V2, MaskTech International GmbH, Version 0.5, 17.07.2020 (confidential document) [11] Xaica-α PLUS ePassport – User Guidance, BSI-DSZ-CC-1073-V2/1074-V2, MaskTech International

Standards
AIS 34, AIS 36, AIS 25, AIS 26, AIS 46, AIS 31, AIS 20, AIS 35, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ICAO
Technical reports
BSI TR-03110, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-1074-V2-2020
Subject: Xaica-Alpha PLUS ePassport on MTCOS Pro 2.5 with SAC (BAC+PACE) and Active Authentication / ST 31G480 D01
Keywords: "Common Criteria, Certification, Zertifizierung, passport, Pass, Ausweis, hoheitliche Dokumente, MaskTech"
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20200805123008+02'00'
Modification date: D:20200811142400+02'00'
Pages: 25
Creator: Writer
Producer: LibreOffice 6.2

Frontpage

Certificate ID: BSI-DSZ-CC-1074-V2-2020
Certified item: Xaica-α PLUS ePassport on MTCOS Pro 2.5 with SAC (BAC+PACE) and Active Authentication / ST31G480 D01
Certification lab: BSI
Developer: MaskTech International GmbH sponsored by NTT DATA CORPORATION

References

Outgoing
  • ANSSI-CC-2019/12 - ST31G480 D01, including optional cryptographic library NesLib NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X
  • BSI-DSZ-CC-1074-2019 - Xaica-α PLUS ePassport on MTCOS Pro 2.5 with SAC (BAC+PACE) and Active Authentication / ST31G480 C01

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, TDEA, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-384
Schemes
MAC, Key agreement, Key Agreement
Protocols
PACE
Randomness
TRNG, RNG, RND
Elliptic Curves
P-256, P-384, NIST P-256, NIST P-384
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG13, EF.DG15, EF.DG14, EF.COM, EF.CardAccess, EF.SOD
Trusted Execution Environments
SSC
Vendor
STMicroelectronics

Security level
EAL4, EAL5, EAL4 augmented, EAL5 augmented
Claims
O.AA, O.BAC, O.PACE, O.RND, T.RND, A.PKI, OE.PKI
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.2, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS.1, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_CMS.4, ALC_TAT.1, ALC_CMC.5, ALC_FLR.1, ALC_TAT.3, ATE_COV.2, ATE_FUN.1, ATE_DPT.1, ATE_IND.2, AVA_VAN.3, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_RND.1, FCS_RND, FCS_RNG, FCS_RND.1.1, FCS_RND.1.2, FCS_CKM.2, FCS_COP.1, FCS_CKM.1, FCS_CKM.4.1, FCS_RNG.1, FDP_ACC, FDP_ACF, FDP_ITC.1, FDP_UCT, FDP_UIT, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_UCT.1, FDP_UIT.1, FDP_ITT.1, FDP_SDC.1, FDP_SDI.2, FDP_ITC, FIA_AFL, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UID.1, FIA_AFL.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FIA_UID, FMT_MOF.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM, FMT_MSA, FMT_SMF, FMT_SMR, FPT_EMS.1, FPT_PHP.3, FPT_EMS, FPT_EMS.1.1, FPT_EMS.1.2, FPT_PHP.3.1, FPT_ITT.1, FPT_FLS.1, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1074-V2, ANSSI-CC-2019/12

Side-channel analysis
Leak-Inherent, Physical Probing, SPA, DPA, timing attacks, Physical tampering, Malfunction

Standards
FIPS 140-2, FIPS PUB 140-2, FIPS PUB 180-4, FIPS PUB 197, AIS 31, ISO/IEC 9797-1, ISO/IEC 15408, ISO/IEC 10116:2006, ISO/IEC7816:2008, ICAO, CCMB-2017-04-004, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title: Xaica-alpha PLUS ePassport on MTCOS Pro 2.5 with SAC (BAC + PACE) and Active Authentication / ST31G480 D01 - Security Target lite
Subject: Common Criteria Certification
Keywords: Smart card, IC card, ePassport, Basic Access Control (BAC), Supplemental Access Control (SAC), PACE, Active Authentication
Author: MaskTech International GmbH
Creation date: D:20200717115408+02'00'
Modification date: D:20200717122703+02'00'
Pages: 82
Creator: LaTeX with hyperref
Producer: pdfTeX-1.40.20

References

Outgoing
  • ANSSI-CC-2019/12 - ST31G480 D01, including optional cryptographic library NesLib NESLIB and optional technologies MIFARE DESFire EV1 and MIFARE Plus X

Heuristics ?

Certificate ID: BSI-DSZ-CC-1074-V2-2020

Extracted SARs

ADV_FSP.4, ASE_TSS.2, ADV_ARC.1, ALC_DEL.1, ALC_DVS.2, AVA_VAN.5, ASE_REQ.2, ATE_FUN.1, ALC_CMS.4, ATE_COV.2, ALC_FLR.1, ADV_IMP.2, ASE_CCL.1, ATE_DPT.1, ALC_TAT.3, ALC_COMP.1, ALC_CMC.5, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ATE_IND.2, ASE_INT.1, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Xaica-Alpha PLUS ePassport on MTCOS Pro 2.5 with SAC (BAC+PACE) and Active Authentication / ST31G480 D01 was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2.5']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2019/12', 'BSI-DSZ-CC-1074-V2']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2019/12', 'BSI-DSZ-CC-1074-V2']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1073-V2', 'ANSSI-CC-2019/12', 'BSI-DSZ-CC-1074-2019', 'BSI-DSZ-CC-1074-V2']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1073-V2', 'BSI-DSZ-CC-1073-2019', 'BSI-DSZ-CC-1074-V2', 'BSI-DSZ-CC-1074-2019', 'ANSSI-CC-2019/12', 'ANSSI-CC-2017/61']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'ef7bdb12563b29e2d2de47531909aec7d23f337d721ae22b35566c8361b36c61', 'st_pdf_hash': '7659091c030dc9a804caef5595eda7381942d154751388ce5e7671d7ed5139b6', 'report_txt_hash': '883dedf1c0cfcb45dfc148eddad9aaec373fc117089d63254e9678e94b79a67f', 'st_txt_hash': 'd2954327b2e52ee574fda5673844b8cd8f03813ff2f32bb11038b92300b8171b'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 2, 'DES': 2}, 'rules_asymmetric_crypto': {'ECC': 3, 'Diffie-Hellman': 1, 'DSA': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'PACE': 23, 'MAC': 1, 'Key Exchange': 1}, 'rules_randomness': {'RNG': 1}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'fault injection': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_ecc_curves': {'__insert__': {'NIST P-256': 4, 'NIST P-384': 4}}} data.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierungsreporte', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/AIS', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/', 'https://www.sogis.eu/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1074-2019': 6, 'BSI-DSZ-CC-1074-V2-2020': 54, 'BSI-DSZ-CC-1074-V2': 3, 'BSI-DSZ-CC-1073-V2': 3}, 'FR': {'ANSSI-CC-2019/12': 10}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL 5': 2, 'EAL 2': 3, 'EAL 1': 1, 'EAL5+': 1, 'EAL6': 1, 'EAL 5+': 1, 'EAL 6': 1, 'EAL 4 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 4, 'ALC_FLR': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_COMP.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'OE': {'OE.PKI': 1}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 8, 'STM': 1}}, 'eval_facility': {'Serma': {'Serma Safety & Security': 1}, 'SRC': {'SRC Security Research & Consulting': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 3}}, 'FF': {'DH': {'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'PACE': {'PACE': 23}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Neslib': {'NesLib 6.2.1': 1, 'NESLIB v6.2.1': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'fault injection': 1}, 'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 3, 'AIS 36': 5, 'AIS 25': 3, 'AIS 26': 3, 'AIS 46': 1, 'AIS 31': 2, 'AIS 20': 2, 'AIS 35': 2, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2, 'ISO/IEC 18045': 2}, 'ICAO': {'ICAO': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Pro 2.5 with SAC (BAC+PACE) and Active Authentication / ST31G480 D01, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1074-V2-2020, Version1.1, 17.07.2020, Xaica-α PLUS ePassport': 1, '020, Evaluation Technical Report (ETR) BSI-DSZ-CC-1074-V2, SRC Security Research & Consulting GmbH (confidential document) [9] JISEC C0500, version 1.00, Protection Profile for ePassport IC with SAC (BAC+PACE) and Active': 1, 'α PLUS ePassport, BSI-DSZ-CC-1073-V2/1074-V2, MaskTech International GmbH, Version 0.5, 17.07.2020 (confidential document) [11] Xaica-α PLUS ePassport – User Guidance, BSI-DSZ-CC-1073-V2/1074-V2, MaskTech International': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1074-V2': 6}, 'FR': {'ANSSI-CC-2019/12': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0068-V2-2011': 1, 'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4': 6, 'EAL5': 2, 'EAL4 augmented': 3, 'EAL5 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 2, 'ADV_IMP.2': 1, 'ADV_TDS.5': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 8, 'ALC_CMC.4': 2, 'ALC_CMS.4': 2, 'ALC_DEL.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2, 'ALC_CMC.5': 1, 'ALC_FLR.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.3': 3}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_CKM.4': 45, 'FCS_RND.1': 17, 'FCS_RND': 2, 'FCS_RNG': 1, 'FCS_RND.1.1': 2, 'FCS_RND.1.2': 2, 'FCS_CKM.2': 6, 'FCS_COP.1': 6, 'FCS_CKM.1': 22, 'FCS_CKM.4.1': 1, 'FCS_RNG.1': 4}, 'FDP': {'FDP_ITC.1': 38, 'FDP_ITC.2': 22, 'FDP_ACF.1': 6, 'FDP_ACC.1': 16, 'FDP_IFC.1': 13, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ITT.1': 3, 'FDP_SDC.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_UAU.1': 19, 'FIA_UAU.4': 8, 'FIA_UAU.5': 10, 'FIA_UID.1': 17, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 9, 'FMT_MTD.1': 9, 'FMT_SMF.1': 16, 'FMT_SMR.1': 15, 'FMT_MSA.3': 12, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_EMS.1': 18, 'FPT_PHP.3': 14, 'FPT_EMS': 3, 'FPT_EMS.1.1': 3, 'FPT_EMS.1.2': 3, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 3, 'FPT_FLS.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 21, 'FTP_TRP.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.AA': 8, 'O.BAC': 10, 'O.PACE': 10, 'O.RND': 1}, 'T': {'T.RND': 1}, 'A': {'A.PKI': 4}, 'OE': {'OE.PKI': 3}}, 'vendor': {'STMicroelectronics': {'STMicroelectronics': 11}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 29}}, 'DES': {'DES': {'DES': 23, 'DEA': 1}, '3DES': {'3DES': 10, 'Triple-DES': 2, 'TDES': 4, 'TDEA': 1}}, 'constructions': {'MAC': {'CMAC': 14}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 5}, 'ECC': {'ECC': 11}}, 'FF': {'DH': {'DH': 3, 'Diffie-Hellman': 2}, 'DSA': {'DSA': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6}, 'SHA2': {'SHA-256': 10, 'SHA-384': 5}}}, 'crypto_scheme': {'MAC': {'MAC': 29}, 'KA': {'Key agreement': 3, 'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 201}}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RND': 4, 'RNG': 11}}, 'cipher_mode': {'CBC': {'CBC': 24}}, 'ecc_curve': {'NIST': {'P-256': 4, 'P-384': 4, 'NIST P-256': 4, 'NIST P-384': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 6, 'Physical Probing': 2, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'Physical tampering': 2, 'Malfunction': 6}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 14, 'EF.DG2': 14, 'EF.DG13': 14, 'EF.DG15': 15, 'EF.DG14': 13, 'EF.COM': 14, 'EF.CardAccess': 5, 'EF.SOD': 13}}, 'standard_id': {'FIPS': {'FIPS 140-2': 2, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 197': 1}, 'BSI': {'AIS 31': 1}, 'ISO': {'ISO/IEC 9797-1': 2, 'ISO/IEC 15408': 2, 'ISO/IEC 10116:2006': 1, 'ISO/IEC7816:2008': 1}, 'ICAO': {'ICAO': 11}, 'CC': {'CCMB-2017-04-004': 2, 'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '1074V2a_pdf.pdf', 'st_filename': '1074V2b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1074-2019': 8, 'BSI-DSZ-CC-1074-V2-2020': 30, 'BSI-DSZ-CC-1073-V2': 6}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 5}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_DVS.2': 5}}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 5}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__update__': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4}}, 'ICAO': {'__update__': {'ICAO': 2}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'__insert__': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Evaluation Technical Report (ETR) BSI-DSZ-CC-1074-V2, SRC Security Research & Consulting GmbH (confidential document) [9] JISEC C0500, version 1.00, Protection Profile for ePassport IC with SAC (BAC+PACE) and Active': 1, 'PLUS ePassport, BSI-DSZ-CC-1073-V2/1074-V2, MaskTech International GmbH, Version 0.5, 17.07.2020 (confidential document) [11] Xaica-α PLUS ePassport – User Guidance, BSI-DSZ-CC-1073-V2/1074-V2, MaskTech International': 1}, '__delete__': ['identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification', '020, Evaluation Technical Report (ETR) BSI-DSZ-CC-1074-V2, SRC Security Research & Consulting GmbH (confidential document) [9] JISEC C0500, version 1.00, Protection Profile for ePassport IC with SAC (BAC+PACE) and Active', 'α PLUS ePassport, BSI-DSZ-CC-1073-V2/1074-V2, MaskTech International GmbH, Version 0.5, 17.07.2020 (confidential document) [11] Xaica-α PLUS ePassport – User Guidance, BSI-DSZ-CC-1073-V2/1074-V2, MaskTech International']}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4 augmented': 4}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.4': 1, 'ADV_TDS.3': 1}}, 'AGD': {'__update__': {'AGD_PRE.1': 1}}, 'ALC': {'__insert__': {'ALC_DVS.1': 1}, '__update__': {'ALC_DVS.2': 9, 'ALC_CMS.4': 1, 'ALC_TAT.1': 1}}, 'ATE': {'__update__': {'ATE_DPT.1': 1, 'ATE_IND.2': 1}}, 'AVA': {'__insert__': {'AVA_VAN.5': 1}}, 'ASE': {'__delete__': ['ASE_ECD.1', 'ASE_OBJ.2', 'ASE_SPD.1']}}}, 'cc_sfr': {'__update__': {'FCS': {'__insert__': {'FCS_CKM': 33, 'FCS_COP': 140}, '__update__': {'FCS_CKM.4': 46, 'FCS_COP.1': 16, 'FCS_CKM.1': 25}}, 'FDP': {'__insert__': {'FDP_ACC': 40, 'FDP_ACF': 32, 'FDP_UCT': 19, 'FDP_UIT': 19, 'FDP_UCT.1': 2, 'FDP_UIT.1': 4, 'FDP_ITC': 1}, '__update__': {'FDP_ITC.1': 40, 'FDP_ACF.1': 18, 'FDP_ACC.1': 19}}, 'FIA': {'__insert__': {'FIA_AFL': 27, 'FIA_AFL.1': 6, 'FIA_UID': 1}, '__update__': {'FIA_UAU.1': 18, 'FIA_UAU.4': 10, 'FIA_UAU.5': 13, 'FIA_UID.1': 15}}, 'FMT': {'__insert__': {'FMT_LIM': 4, 'FMT_MSA': 4, 'FMT_SMF': 2, 'FMT_SMR': 1}, '__update__': {'FMT_MTD.1': 10, 'FMT_SMR.1': 12}}, 'FPT': {'__update__': {'FPT_EMS.1': 19, 'FPT_PHP.3': 13}}, 'FTP': {'__update__': {'FTP_ITC.1': 22}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.AA': 7, 'O.BAC': 8, 'O.PACE': 9}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 24}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 5}, '__delete__': ['DEA']}, '3DES': {'__update__': {'3DES': 9}, '__delete__': ['Triple-DES', 'TDES']}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 11}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDSA': {'__update__': {'ECDSA': 6}}, 'ECC': {'__update__': {'ECC': 7}}}}, 'FF': {'__update__': {'DH': {'__delete__': ['DH']}}, '__delete__': ['DSA']}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 7}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 10}}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 113}}}}, 'randomness': {'__update__': {'TRNG': {'__update__': {'TRNG': 1}}, 'RNG': {'__update__': {'RND': 2, 'RNG': 7}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 18}}}}, 'ic_data_group': {'__update__': {'EF': {'__update__': {'EF.DG1': 11, 'EF.DG13': 12, 'EF.DG15': 14, 'EF.SOD': 11}}}}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 15}}}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/58']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}]} values added.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'crypto_protocol': {'__insert__': {'PGP': {'PGP': 3}}}} data.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1074-V2']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1074-V2']}}} data.
    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1073-V2', 'BSI-DSZ-CC-1074-V2']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1073-V2', 'BSI-DSZ-CC-1074-V2']}}} data.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/1074V2c_pdf.pdf",
  "dgst": "4832a44c0df0bad2",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "BSI-DSZ-CC-1074-V2-2020",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.5"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1074-2019",
          "ANSSI-CC-2019/12"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2017/61",
          "BSI-DSZ-CC-1073-2019",
          "ANSSI-CC-2016/58",
          "BSI-DSZ-CC-1074-2019",
          "ANSSI-CC-2019/12"
        ]
      }
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2019/12"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2019/12"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "MaskTech International GmbH",
  "manufacturer_web": "https://www.masktech.de/",
  "name": "Xaica-Alpha PLUS ePassport on MTCOS Pro 2.5 with SAC (BAC+PACE) and Active Authentication / ST31G480 D01",
  "not_valid_after": "2025-07-30",
  "not_valid_before": "2020-07-30",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "1074V2a_pdf.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2",
        "cc_version": "Product specific Security Target Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1074-V2-2020",
        "cert_item": "Xaica-\u03b1 PLUS ePassport on MTCOS Pro 2.5 with SAC (BAC+PACE) and Active Authentication / ST31G480 D01",
        "cert_lab": "BSI",
        "developer": "MaskTech International GmbH sponsored by NTT DATA CORPORATION",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "None - Based on Protection Profile for ePassport IC with SAC (BAC+PACE) and Active Authentication, Version 1.00, March 8, 2016, JISEC C0500"
      },
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1073-V2": 6,
          "BSI-DSZ-CC-1074-2019": 8,
          "BSI-DSZ-CC-1074-V2": 3,
          "BSI-DSZ-CC-1074-V2-2020": 30
        },
        "FR": {
          "ANSSI-CC-2019/12": 10
        }
      },
      "cc_claims": {
        "OE": {
          "OE.PKI": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_COMP.1": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 5,
          "ALC_FLR": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 4": 5,
          "EAL 4 augmented": 3,
          "EAL 5": 2,
          "EAL 5+": 1,
          "EAL 6": 1,
          "EAL5+": 1,
          "EAL6": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Evaluation Technical Report (ETR) BSI-DSZ-CC-1074-V2, SRC Security Research \u0026 Consulting GmbH (confidential document) [9] JISEC C0500, version 1.00, Protection Profile for ePassport IC with SAC (BAC+PACE) and Active": 1,
          "PLUS ePassport, BSI-DSZ-CC-1073-V2/1074-V2, MaskTech International GmbH, Version 0.5, 17.07.2020 (confidential document) [11] Xaica-\u03b1 PLUS ePassport \u2013 User Guidance, BSI-DSZ-CC-1073-V2/1074-V2, MaskTech International": 1,
          "Pro 2.5 with SAC (BAC+PACE) and Active Authentication / ST31G480 D01, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1074-V2-2020, Version1.1, 17.07.2020, Xaica-\u03b1 PLUS ePassport": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Neslib": {
          "NESLIB v6.2.1": 1,
          "NesLib 6.2.1": 1
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 5
        },
        "PGP": {
          "PGP": 3
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "SRC": {
          "SRC Security Research \u0026 Consulting": 3
        },
        "Serma": {
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 25": 3,
          "AIS 26": 3,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 35": 2,
          "AIS 36": 5,
          "AIS 38": 1,
          "AIS 46": 1
        },
        "ICAO": {
          "ICAO": 2
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        },
        "DES": {
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-03110": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "STMicroelectronics": {
          "STM": 1,
          "STMicroelectronics": 8
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20200805123008+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, passport, Pass, Ausweis, hoheitliche Dokumente, MaskTech\" ",
      "/ModDate": "D:20200811142400+02\u002700\u0027",
      "/Producer": "LibreOffice 6.2",
      "/Subject": "Xaica-Alpha PLUS ePassport on MTCOS Pro 2.5 with SAC (BAC+PACE) and Active Authentication / ST 31G480 D01",
      "/Title": "Certification Report BSI-DSZ-CC-1074-V2-2020",
      "pdf_file_size_bytes": 708179,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.bsi.bund.de/",
          "https://www.sogis.eu/",
          "https://www.bsi.bund.de/zertifizierung"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 25
    },
    "st_filename": "1074V2b_pdf.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 7
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1074-V2": 6
        },
        "FR": {
          "ANSSI-CC-2019/12": 4
        }
      },
      "cc_claims": {
        "A": {
          "A.PKI": 4
        },
        "O": {
          "O.AA": 7,
          "O.BAC": 8,
          "O.PACE": 9,
          "O.RND": 1
        },
        "OE": {
          "OE.PKI": 3
        },
        "T": {
          "T.RND": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011": 1,
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 2,
          "ADV_IMP.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 9,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 2,
          "ALC_TAT.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 3,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 6,
          "EAL4 augmented": 4,
          "EAL5": 2,
          "EAL5 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM": 33,
          "FCS_CKM.1": 25,
          "FCS_CKM.2": 6,
          "FCS_CKM.4": 46,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 140,
          "FCS_COP.1": 16,
          "FCS_RND": 2,
          "FCS_RND.1": 17,
          "FCS_RND.1.1": 2,
          "FCS_RND.1.2": 2,
          "FCS_RNG": 1,
          "FCS_RNG.1": 4
        },
        "FDP": {
          "FDP_ACC": 40,
          "FDP_ACC.1": 19,
          "FDP_ACF": 32,
          "FDP_ACF.1": 18,
          "FDP_IFC.1": 13,
          "FDP_ITC": 1,
          "FDP_ITC.1": 40,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 22,
          "FDP_ITT.1": 3,
          "FDP_SDC.1": 1,
          "FDP_SDI.2": 1,
          "FDP_UCT": 19,
          "FDP_UCT.1": 2,
          "FDP_UIT": 19,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 27,
          "FIA_AFL.1": 6,
          "FIA_UAU.1": 18,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 10,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 13,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 15,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 4,
          "FMT_MOF.1": 9,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 4,
          "FMT_MSA.3": 12,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 2,
          "FMT_SMF.1": 16,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 12,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 3,
          "FPT_EMS.1": 19,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 1,
          "FPT_ITT.1": 3,
          "FPT_PHP.3": 13,
          "FPT_PHP.3.1": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC.1": 22,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 8
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 18
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 113
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 3
        },
        "MAC": {
          "MAC": 10
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-256": 4,
          "NIST P-384": 4,
          "P-256": 4,
          "P-384": 4
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          },
          "SHA2": {
            "SHA-256": 10,
            "SHA-384": 5
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 14,
          "EF.CardAccess": 5,
          "EF.DG1": 11,
          "EF.DG13": 12,
          "EF.DG14": 13,
          "EF.DG15": 14,
          "EF.DG2": 14,
          "EF.SOD": 11
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 7
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 6,
          "Physical tampering": 2
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 6,
          "Physical Probing": 2,
          "SPA": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS 140-2": 2,
          "FIPS PUB 140-2": 1,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 197": 1
        },
        "ICAO": {
          "ICAO": 15
        },
        "ISO": {
          "ISO/IEC 10116:2006": 1,
          "ISO/IEC 15408": 2,
          "ISO/IEC 9797-1": 2,
          "ISO/IEC7816:2008": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 24
          }
        },
        "DES": {
          "3DES": {
            "3DES": 9,
            "TDEA": 1
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 11
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SSC": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "STMicroelectronics": {
          "STMicroelectronics": 11
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "MaskTech International GmbH",
      "/CreationDate": "D:20200717115408+02\u002700\u0027",
      "/Creator": "LaTeX with hyperref",
      "/Keywords": "Smart card, IC card, ePassport, Basic Access Control (BAC), Supplemental Access Control (SAC), PACE, Active Authentication",
      "/ModDate": "D:20200717122703+02\u002700\u0027",
      "/PTEX.Fullbanner": "This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019/Cygwin) kpathsea version 6.3.1",
      "/Producer": "pdfTeX-1.40.20",
      "/Subject": "Common Criteria Certification",
      "/Title": "Xaica-alpha PLUS ePassport on MTCOS Pro 2.5 with SAC (BAC + PACE) and Active Authentication / ST31G480 D01 - Security Target lite",
      "/Trapped": "/False",
      "pdf_file_size_bytes": 401665,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 82
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/1074V2a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/1074V2b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "ef7bdb12563b29e2d2de47531909aec7d23f337d721ae22b35566c8361b36c61",
    "report_txt_hash": "883dedf1c0cfcb45dfc148eddad9aaec373fc117089d63254e9678e94b79a67f",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "7659091c030dc9a804caef5595eda7381942d154751388ce5e7671d7ed5139b6",
    "st_txt_hash": "d2954327b2e52ee574fda5673844b8cd8f03813ff2f32bb11038b92300b8171b"
  },
  "status": "active"
}