SOMA-c016 Machine Readable Electronic Document ICAO Application - BAC, version 3

CSV information ?

Status active
Valid from 10.09.2020
Valid until 10.09.2025
Scheme 🇳🇱 NL
Manufacturer HID Global
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, ALC_DVS.2

Heuristics summary ?

Certificate ID: NSCIB-CC-0061438-CR

Certification report ?

Extracted keywords

Protocols
PACE

Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL4+, EAL 4, EAL6+, EAL4 augmented, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2
Protection profiles
BSI-CC-PP-0055
Certificates
BSI-DSZ-CC-1040-2019, NSCIB-CC-0061438-CR
Certification process
out of scope, below were evaluated concurrently with this TOE, but are addressed by separate certificates and are out of scope of this report. • ICAO Application - EAC-PACE-AA • eIDAS QSCD Application. 2.4 Architectural

Side-channel analysis
side channel, side-channel, JIL
Certification process
out of scope, below were evaluated concurrently with this TOE, but are addressed by separate certificates and are out of scope of this report. • ICAO Application - EAC-PACE-AA • eIDAS QSCD Application. 2.4 Architectural

Standards
AIS36, ISO/IEC 7816-3, ISO/IEC 14443, ICAO

File metadata

Title: NSCIB-CC-0061438-CR(BAC).docx
Author: p647
Creation date: D:20200910135851+02'00'
Pages: 12
Creator: pdfFactory Pro www.pdffactory.com
Producer: pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch)

Frontpage

Certificate ID: NSCIB-CC-0061438-CR
Certified item: SOMA-c016 Machine Readable Electronic Document ICAO Application - BAC, version 3
Certification lab: UL
Developer: HID Global

References

Outgoing
  • BSI-DSZ-CC-1040-2019 - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library

Security target ?

Extracted keywords

Symmetric Algorithms
AES-256, AES, DES, Triple-DES, TDES, TDEA
Hash functions
SHA-1, SHA-256, SHA-224
Schemes
MAC
Protocols
PACE
Randomness
DTRNG, RND
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG15, EF.DG14, EF.DG13, EF.COM, EF.SOD
Vendor
NXP, NXP Semiconductors

Security level
EAL4+, EAL4, EAL6+, EAL6, EAL4 augmented, EAL6 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_ARC, ADV_FSP, ADV_TDS, ADV_IMP, AGD_OPE.1, AGD_PRE.1, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_DVS.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ALC_FLR, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CMK.4, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FDP_UIT.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FDP_ACF.1.2, FDP_ACF.1.4, FDP_ITC, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_AFL, FIA_UAU.5.2, FIA_SOS.2, FIA_AFL.1, FMT_LIM, FMT_SMF.1, FMT_SMR.1, FMT_LIM.1, FMT_LIM.2, FMT_MTD, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MTD.1, FMT_MSA.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_TST, FPT_TST.1.3, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0055, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1040-2019
Certification process
out of scope, These data are protected by means of Extended Access Control, which is out of scope of this ST, optional according to [R8]. These data are protected by means of Extended Access Control, which is out of scope of this ST. SOMA-c016 Security Target BAC ICAO Application – Public Version ASE Version: 1.4 Date

Side-channel analysis
physical probing, side channels, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering
Certification process
out of scope, These data are protected by means of Extended Access Control, which is out of scope of this ST, optional according to [R8]. These data are protected by means of Extended Access Control, which is out of scope of this ST. SOMA-c016 Security Target BAC ICAO Application – Public Version ASE Version: 1.4 Date

Standards
FIPS 46-3, FIPS 180-4, FIPS 180-2, FIPS 197, FIPS PUB 180-4, FIPS PUB 197, NIST SP 800-67, SP 800-38A, NIST SP 800-38A, PKCS #15, AIS31, RFC 2119, RFC 3369, ISO/IEC 7816-2, ISO/IEC 14443, ISO/IEC 7816-4, ICAO
Technical reports
BSI TR-03110

File metadata

Title: Security Target for SOMA-c016 Machine Readable Electronic Document - ICAO Application - Basic Access Control - Public version
Subject: SOMA-c016 Machine Readable Electronic Document
Author: Marco EVANGELISTA
Creation date: D:20200814134345+02'00'
Modification date: D:20200814134345+02'00'
Pages: 128
Creator: Microsoft® Word for Office 365
Producer: Microsoft® Word for Office 365

References

Outgoing
  • BSI-DSZ-CC-1040-2019 - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library

Heuristics ?

Certificate ID: NSCIB-CC-0061438-CR

Extracted SARs

ASE_OBJ.2, ADV_FSP.4, ALC_TAT.1, ADV_IMP.1, ASE_TSS.2, ADV_ARC.1, ALC_DEL.1, ADV_TDS.3, ALC_DVS.2, AVA_VAN.3, ASE_REQ.2, ALC_CMS.4, ATE_FUN.1, ATE_COV.2, ASE_CCL.1, ATE_DPT.1, ASE_ECD.1, AGD_OPE.1, ALC_CMC.4, AGD_PRE.1, ASE_SPD.1, ATE_IND.2, ASE_INT.1, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name SOMA-c016 Machine Readable Electronic Document ICAO Application - BAC, version 3 was processed.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {'cert_id': 'NSCIB-CC-0061438-CR', 'cert_item': 'SOMA-c016 Machine Readable Electronic Document ICAO Application - BAC, version 3', 'developer': 'HID Global', 'cert_lab': ' UL'}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['3']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1040-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1040-2019']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1040-2019']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1040-2019']}}}.
    • The cert_lab property was set to [''].
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'a6ca10d7b33b6baf81313a7d1c4f91e553dd095768aac395ff73717983d150ba', 'st_pdf_hash': 'dadbeb0c9e51bfee4b8b83419cf08b657cc9f010c98b22ce70ec5a9a6b8ea10a', 'report_txt_hash': '13b500efad740f019a5c5e6634816d0a7dc990d4db807e629b85ab39828b5318', 'st_txt_hash': '0cadfa6cbffa09fdad10ae8460ab6f909909a5d646f2148f5dcfe4ed7cf5f197'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'PACE': 1}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'side channel': 1, 'side-channel': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES-256': 2, 'AES': 12, 'DES': 29, 'TDES': 2, 'TDEA': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 4, 'SHA-256': 3, 'SHA-224': 1}, 'rules_crypto_schemes': {'PACE': 7, 'MAC': 32}, 'rules_randomness': {'DTRNG': 1, 'TRNG': 1, 'RND': 8, 'RNG': 1}, 'rules_tee': {'SE': 128}, 'rules_side_channels': {'Malfunction': 11, 'malfunction': 5, 'physical probing': 2, 'Physical Tampering': 6, 'physical tampering': 2, 'Physical tampering': 1, 'side channels': 1, 'SPA': 2, 'DPA': 3, 'fault injection': 2, 'timing attacks': 1, 'reverse engineering': 1}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to False.
    • The errors property was set to ["Failed to read metadata of certs/reports/pdf/5f3c4c189362c2e5.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'list'", "Failed to read metadata of certs/reports/pdf/5f3c4c189362c2e5.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'list'"].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1040-2019': 4}, 'NL': {'NSCIB-CC-0061438-CR': 36}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055': 1}}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4+': 1, 'EAL 4': 1, 'EAL6+': 1, 'EAL4 augmented': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 5, 'NXP Semiconductors': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1, 'side-channel': 1}, 'other': {'JIL': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS36': 1}, 'ISO': {'ISO/IEC 7816-3': 1, 'ISO/IEC 14443': 2}, 'ICAO': {'ICAO': 30}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'below were evaluated concurrently with this TOE, but are addressed by separate certificates and are out of scope of this report. • ICAO Application - EAC-PACE-AA • eIDAS QSCD Application. 2.4 Architectural': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1040-2019': 6}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0055': 1, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0068-V2-2011-MA-01': 1, 'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL4': 9, 'EAL6+': 1, 'EAL6': 1, 'EAL4 augmented': 2, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2, 'ADV_TDS.3': 2, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2, 'AGD_OPE': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_CMC.4': 2, 'ALC_CMS.4': 2, 'ALC_DEL.1': 2, 'ALC_LCD.1': 2, 'ALC_TAT.1': 2, 'ALC_DVS.1': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_LCD': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_VAN.3': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 8, 'FAU_SAS': 7, 'FAU_GEN': 1, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RND': 8, 'FCS_RND.1': 12, 'FCS_RND.1.1': 1, 'FCS_CKM.1': 14, 'FCS_CKM.2': 4, 'FCS_COP.1': 5, 'FCS_CKM.4': 27, 'FCS_CMK.4': 1}, 'FDP': {'FDP_ACF.1': 15, 'FDP_UCT.1': 11, 'FDP_ACC.1': 21, 'FDP_ACF': 1, 'FDP_ITC.1': 10, 'FDP_ITC.2': 10, 'FDP_UIT.1': 10, 'FDP_IFC.1': 4, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_UAU.1': 20, 'FIA_UAU.4': 17, 'FIA_UAU.5': 10, 'FIA_UAU.6': 12, 'FIA_UAU.5.2': 1, 'FIA_SOS.2': 1, 'FIA_UID.1': 13, 'FIA_AFL.1': 1}, 'FMT': {'FMT_LIM.1': 22, 'FMT_LIM.2': 21, 'FMT_LIM': 8, 'FMT_SMF.1': 30, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 3, 'FMT_MSA.3': 3, 'FMT_SMR.1': 29, 'FMT_MTD.1': 2, 'FMT_MSA.1': 1}, 'FPT': {'FPT_FLS.1': 12, 'FPT_TST.1': 9, 'FPT_PHP.3': 10, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5}}, 'cc_claims': {'D': {'D.ICC': 1}}, 'vendor': {'NXP': {'NXP': 11, 'NXP Semiconductors': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES-256': 2, 'AES': 12}}, 'DES': {'DES': {'DES': 31, 'DEA': 1}, '3DES': {'Triple-DES': 21, 'TDES': 2, 'TDEA': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-256': 3, 'SHA-224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 32}}, 'crypto_protocol': {'PACE': {'PACE': 7}}, 'randomness': {'TRNG': {'DTRNG': 1}, 'RNG': {'RND': 8, 'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 6}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'side channels': 1, 'DPA': 3, 'SPA': 2, 'timing attacks': 1}, 'FI': {'Physical Tampering': 6, 'physical tampering': 2, 'Physical tampering': 1, 'Malfunction': 11, 'malfunction': 5, 'fault injection': 2}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 2}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 128}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 31, 'EF.DG2': 10, 'EF.DG3': 8, 'EF.DG4': 7, 'EF.DG5': 9, 'EF.DG16': 25, 'EF.DG15': 8, 'EF.DG14': 12, 'EF.DG13': 8, 'EF.COM': 10, 'EF.SOD': 10}}, 'standard_id': {'FIPS': {'FIPS 46-3': 5, 'FIPS 180-4': 1, 'FIPS 180-2': 1, 'FIPS 197': 2, 'FIPS PUB 180-4': 1, 'FIPS PUB 197': 1}, 'NIST': {'NIST SP 800-67': 6, 'SP 800-38A': 2, 'NIST SP 800-38A': 4}, 'PKCS': {'PKCS #15': 1}, 'BSI': {'AIS31': 2}, 'RFC': {'RFC 2119': 1, 'RFC 3369': 1}, 'ISO': {'ISO/IEC 7816-2': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 184}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '. These data are protected by means of Extended Access Control, which is out of scope of this ST': 1, 'optional according to [R8]. These data are protected by means of Extended Access Control, which is out of scope of this ST. SOMA-c016 Security Target BAC ICAO Application – Public Version ASE Version: 1.4 Date': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_lab property was set to None.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 146395, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 12, '/Author': 'p647', '/CreationDate': "D:20200910135851+02'00'", '/Creator': 'pdfFactory Pro www.pdffactory.com', '/Producer': 'pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch)', '/Title': 'NSCIB-CC-0061438-CR(BAC).docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:info@nl.tuv.com', 'http://www.tuv.com/nl', 'http://www.commoncriteriaportal.org', 'http://www.sogisportal.eu']}}.

    The computed heuristics were updated.

    • The cert_lab property was set to [''].
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'NSCIB-CC-0061438-CR(BAC).pdf', 'st_filename': 'HIDGlobal_ST-LITE_SOMA-c016_BAC_v1.4.pdf'}.
    • The report_keywords property was updated, with the {'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_DVS.2': 2}}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP': 4}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 28}}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'AGD': {'__insert__': {'AGD_PRE': 1}}, 'ALC': {'__insert__': {'ALC_DVS': 1, 'ALC_TAT': 1, 'ALC_FLR': 1}, '__update__': {'ALC_DVS.2': 9}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS.1': 10}}, 'FCS': {'__insert__': {'FCS_CKM': 27, 'FCS_COP': 56}, '__update__': {'FCS_RND.1': 14, 'FCS_CKM.1': 17, 'FCS_COP.1': 9, 'FCS_CKM.4': 28}}, 'FDP': {'__insert__': {'FDP_ITC': 2}, '__update__': {'FDP_ACF.1': 18, 'FDP_UCT.1': 12, 'FDP_ACC.1': 23, 'FDP_UIT.1': 12}}, 'FIA': {'__insert__': {'FIA_AFL': 28}, '__update__': {'FIA_UAU.1': 22, 'FIA_UAU.4': 21, 'FIA_UAU.5': 15, 'FIA_UID.1': 15, 'FIA_AFL.1': 9}}, 'FMT': {'__insert__': {'FMT_MTD': 40}, '__update__': {'FMT_LIM.1': 24, 'FMT_LIM.2': 20, 'FMT_SMF.1': 32, 'FMT_SMR.1': 32, 'FMT_MTD.1': 8}}, 'FPT': {'__insert__': {'FPT_TST': 1}, '__update__': {'FPT_FLS.1': 13, 'FPT_TST.1': 12, 'FPT_PHP.3': 14}}}}, 'cc_claims': {}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 8}, '__delete__': ['DEA']}, '3DES': {'__update__': {'Triple-DES': 22}}}}}}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA2': {'__update__': {'SHA-256': 4}}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 13}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RND': 1}, '__delete__': ['RNG']}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'physical probing': 3}}, 'FI': {'__update__': {'Physical Tampering': 5, 'Malfunction': 4, 'malfunction': 6}}}}, 'tee_name': {}, 'ic_data_group': {'__update__': {'EF': {'__update__': {'EF.DG16': 27, 'EF.COM': 11, 'EF.SOD': 11}}}}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 177}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {' These data are protected by means of Extended Access Control, which is out of scope of this ST': 1}, '__delete__': ['. These data are protected by means of Extended Access Control, which is out of scope of this ST']}}}} data.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf', 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/Certificate%20NSCIB%2020-0061438.pdf",
  "dgst": "5f3c4c189362c2e5",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "NSCIB-CC-0061438-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1040-2019"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1040-2019"
        ]
      }
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1040-2019"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1040-2019"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "HID Global",
  "manufacturer_web": "https://www.hidglobal.com/",
  "name": "SOMA-c016 Machine Readable Electronic Document ICAO Application - BAC, version 3",
  "not_valid_after": "2025-09-10",
  "not_valid_before": "2020-09-10",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "NSCIB-CC-0061438-CR(BAC).pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {
        "cert_id": "NSCIB-CC-0061438-CR",
        "cert_item": "SOMA-c016 Machine Readable Electronic Document ICAO Application - BAC, version 3",
        "cert_lab": " UL",
        "developer": "HID Global"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1040-2019": 4
        },
        "NL": {
          "NSCIB-CC-0061438-CR": 36
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 2,
          "EAL4 augmented": 1,
          "EAL4+": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "below were evaluated concurrently with this TOE, but are addressed by separate certificates and are out of scope of this report. \u2022 ICAO Application - EAC-PACE-AA \u2022 eIDAS QSCD Application. 2.4 Architectural": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 1
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side channel": 1,
          "side-channel": 1
        },
        "other": {
          "JIL": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS36": 1
        },
        "ICAO": {
          "ICAO": 28
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816-3": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 4,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "p647",
      "/CreationDate": "D:20200910135851+02\u002700\u0027",
      "/Creator": "pdfFactory Pro www.pdffactory.com",
      "/Producer": "pdfFactory Pro 5.32 (Windows 7 Ultimate x64 Dutch)",
      "/Title": "NSCIB-CC-0061438-CR(BAC).docx",
      "pdf_file_size_bytes": 146395,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.tuv.com/nl",
          "http://www.commoncriteriaportal.org",
          "mailto:info@nl.tuv.com",
          "http://www.sogisportal.eu"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 12
    },
    "st_filename": "HIDGlobal_ST-LITE_SOMA-c016_BAC_v1.4.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1040-2019": 6
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 3,
          "ADV_FSP": 1,
          "ADV_FSP.4": 2,
          "ADV_IMP": 1,
          "ADV_IMP.1": 2,
          "ADV_TDS": 1,
          "ADV_TDS.3": 2
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 2,
          "AGD_PRE": 1,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 2,
          "ALC_CMS": 1,
          "ALC_CMS.4": 2,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 9,
          "ALC_FLR": 1,
          "ALC_LCD": 1,
          "ALC_LCD.1": 2,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 9,
          "EAL4 augmented": 2,
          "EAL4+": 1,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 7,
          "FAU_SAS.1": 10,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 27,
          "FCS_CKM.1": 17,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 28,
          "FCS_CMK.4": 1,
          "FCS_COP": 56,
          "FCS_COP.1": 9,
          "FCS_RND": 8,
          "FCS_RND.1": 14,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 23,
          "FDP_ACF": 1,
          "FDP_ACF.1": 18,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 4,
          "FDP_ITC": 2,
          "FDP_ITC.1": 10,
          "FDP_ITC.2": 10,
          "FDP_UCT.1": 12,
          "FDP_UIT.1": 12
        },
        "FIA": {
          "FIA_AFL": 28,
          "FIA_AFL.1": 9,
          "FIA_SOS.2": 1,
          "FIA_UAU.1": 22,
          "FIA_UAU.4": 21,
          "FIA_UAU.5": 15,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 12,
          "FIA_UID.1": 15
        },
        "FMT": {
          "FMT_LIM": 8,
          "FMT_LIM.1": 24,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 20,
          "FMT_LIM.2.1": 3,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 3,
          "FMT_MTD": 40,
          "FMT_MTD.1": 8,
          "FMT_SMF.1": 32,
          "FMT_SMR.1": 32
        },
        "FPT": {
          "FPT_FLS.1": 13,
          "FPT_PHP.3": 14,
          "FPT_TST": 1,
          "FPT_TST.1": 12,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC.1": 5,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {
        "OutOfScope": {
          " These data are protected by means of Extended Access Control, which is out of scope of this ST": 1,
          "optional according to [R8]. These data are protected by means of Extended Access Control, which is out of scope of this ST. SOMA-c016 Security Target BAC ICAO Application \u2013 Public Version ASE Version: 1.4 Date": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 7
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 13
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 4
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 11,
          "EF.DG1": 31,
          "EF.DG13": 8,
          "EF.DG14": 12,
          "EF.DG15": 8,
          "EF.DG16": 27,
          "EF.DG2": 10,
          "EF.DG3": 8,
          "EF.DG4": 7,
          "EF.DG5": 9,
          "EF.SOD": 11
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1
        },
        "TRNG": {
          "DTRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 4,
          "Physical Tampering": 5,
          "Physical tampering": 1,
          "fault injection": 2,
          "malfunction": 6,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 3,
          "SPA": 2,
          "physical probing": 3,
          "side channels": 1,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 180-4": 1,
          "FIPS 197": 2,
          "FIPS 46-3": 5,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 197": 1
        },
        "ICAO": {
          "ICAO": 177
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816-2": 2,
          "ISO/IEC 7816-4": 1
        },
        "NIST": {
          "NIST SP 800-38A": 4,
          "NIST SP 800-67": 6,
          "SP 800-38A": 2
        },
        "PKCS": {
          "PKCS #15": 1
        },
        "RFC": {
          "RFC 2119": 1,
          "RFC 3369": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 12,
            "AES-256": 2
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 2,
            "Triple-DES": 22
          },
          "DES": {
            "DES": 8
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 2
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 11,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Marco EVANGELISTA",
      "/CreationDate": "D:20200814134345+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Office 365",
      "/ModDate": "D:20200814134345+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Office 365",
      "/Subject": "SOMA-c016 Machine Readable Electronic Document",
      "/Title": "Security Target for SOMA-c016 Machine Readable Electronic Document - ICAO Application - Basic Access Control - Public version",
      "pdf_file_size_bytes": 1086819,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 128
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0055b.pdf",
        "pp_name": "Protection Profile for Machine Readable Travel Document with \u0027ICAO Application\u0027, Basic Acce..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-0061438-CR(BAC).pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/HIDGlobal_ST-LITE_SOMA-c016_BAC_v1.4.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "a6ca10d7b33b6baf81313a7d1c4f91e553dd095768aac395ff73717983d150ba",
    "report_txt_hash": "13b500efad740f019a5c5e6634816d0a7dc990d4db807e629b85ab39828b5318",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "dadbeb0c9e51bfee4b8b83419cf08b657cc9f010c98b22ce70ec5a9a6b8ea10a",
    "st_txt_hash": "0cadfa6cbffa09fdad10ae8460ab6f909909a5d646f2148f5dcfe4ed7cf5f197"
  },
  "status": "active"
}