MTCOS Smart Tachograph V2 / SLE78CFX4000P

CSV information ?

Status active
Valid from 03.06.2022
Valid until 03.06.2027
Scheme 🇩🇪 DE
Manufacturer MaskTech International GmbH
Category Other Devices and Systems
Security level ATE_DPT.2, AVA_VAN.2, EAL4+, ALC_DVS.2
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1088-2022

Certificate ?

Extracted keywords

Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ATE_DPT.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0091-2017
Certificates
BSI-DSZ-CC-1088-2022

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title: Certificate BSI-DSZ-CC-1088-2022
Subject: Common Criteria Certification
Keywords: Common Criteria, Certification, Zertifizierung, Tachograph Card
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20220613083859+02'00'
Modification date: D:20220613084333+02'00'
Pages: 1
Creator: Writer
Producer: LibreOffice 6.3

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-2
Randomness
RNG
Libraries
v1.02.013
Elliptic Curves
P-256, P-384, P-521, NIST P-256, NIST P-384, NIST P-521
Block cipher modes
CBC

Vendor
Infineon, Infineon Technologies AG

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 6, EAL5+, EAL6, EAL 5+, EAL6+, EAL 4 augmented, EAL 6 augmented, EAL6 augmented
Claims
OE.EOL
Security Assurance Requirements (SAR)
ADV_ARC, ALC_DVS.2, ALC_FLR, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0091-2017, BSI-CC-PP-0091
Certificates
BSI-DSZ-CC-1088-2022
Evaluation facilities
TÃœV Informationstechnik, SRC Security Research & Consulting
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Digital Tachograph – Tachograph Card, Version 1.0, 10 March 2022, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1088-2022, Security Target lite – MTCOS Smart Tachograph V2 , Tachograph V2 / SLE78CFX4000P, Version 1.5, 12 May 2022, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-1088-2022, Configuration List – MTCOS Smart Tachograph V2 , Version 0.6, 10 May 2022, MaskTech International GmbH (confidential document) [11] User Guidance BSI-DSZ-CC-1088-2022, User Guidance – MTCOS Smart Tachograph V2 / SLE78CFX4000P, Criteria CCv3.1 EAL6 augmented (EAL6+), Version 4.1, 21 October 2020, Infineon Technologies AG (confidential document) Security Target Lite BSI-DSZ-CC-0782-V5, Security Target Lite M7892 B11 Recertification Common, for Composite Evaluation (ETR COMP), BSI-DSZ-CC- 0782-V5, Version 5, TÜV Informationstechnik GmbH (confidential document) [15] COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 of 18 March 2016 implementing Regulation (EU

Side-channel analysis
side channel, malfunction, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Digital Tachograph – Tachograph Card, Version 1.0, 10 March 2022, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1088-2022, Security Target lite – MTCOS Smart Tachograph V2 , Tachograph V2 / SLE78CFX4000P, Version 1.5, 12 May 2022, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-1088-2022, Configuration List – MTCOS Smart Tachograph V2 , Version 0.6, 10 May 2022, MaskTech International GmbH (confidential document) [11] User Guidance BSI-DSZ-CC-1088-2022, User Guidance – MTCOS Smart Tachograph V2 / SLE78CFX4000P, Criteria CCv3.1 EAL6 augmented (EAL6+), Version 4.1, 21 October 2020, Infineon Technologies AG (confidential document) Security Target Lite BSI-DSZ-CC-0782-V5, Security Target Lite M7892 B11 Recertification Common, for Composite Evaluation (ETR COMP), BSI-DSZ-CC- 0782-V5, Version 5, TÜV Informationstechnik GmbH (confidential document) [15] COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 of 18 March 2016 implementing Regulation (EU

Standards
AIS 34, AIS 36, AIS 37, AIS 26, AIS 25, AIS 20, AIS 31, AIS 46, AIS 35, AIS 1, AIS 14, AIS 19, AIS 32, AIS 38, RFC 5480, RFC 5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 7816
Technical reports
BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-1088-2022
Subject: Common Criteria Certification
Keywords: "Common Criteria, Certification, Zertifizierung, Tachograph Card"
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20220613082516+02'00'
Modification date: D:20220613084257+02'00'
Pages: 29
Creator: Writer
Producer: LibreOffice 6.3

Frontpage

Certificate ID: BSI-DSZ-CC-1088-2022
Certified item: MTCOS Smart Tachograph V2 / SLE78CFX4000P
Certification lab: BSI
Developer: MaskTech International GmbH

References

Outgoing

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, 3DES, TDEA, HMAC, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-224, SHA-2
Schemes
MAC, Key agreement
Randomness
TRNG, RNG, RND
Elliptic Curves
P-256, P-384, P-521, NIST P-256, NIST P-384, NIST P-521, secp256r1, secp384r1, secp521r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1
Block cipher modes
CBC

Trusted Execution Environments
SSC
Vendor
Infineon Technologies AG, Infineon

Security level
EAL4, EAL6, EAL4 augmented, EAL6 augmented
Claims
O.RND, OE.EOL
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_FLR.1, ATE_DPT.2, ATE_FUN.1, ATE_DPT.1, ATE_COV.2, ATE_IND.2, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FAU_GEN.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAS.1, FCO_NRO.1, FCO_NRO.1.1, FCO_NRO.1.2, FCO_NRO.1.3, FCS_RNG, FCS_RNG.1, FCS_CKM.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.2, FCS_CKM.4, FCS_COP, FCS_COP.1, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_DAU.1, FDP_ETC.1, FDP_ETC.2, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_SDI.2, FDP_ACC.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_IFC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FIA_SOS.2, FIA_AFL, FIA_AFL.1, FIA_ATD, FIA_ATD.1, FIA_UAU.3, FIA_UAU.4, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UAU, FIA_UAU.1, FIA_UID.1, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.4.1, FIA_UID.2.1, FMT_MSA.3, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FMT_SMF.1, FPR_UNO.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_PHP.3, FPT_TST.1, FPT_TDC, FPT_TDC.1, FPT_ITC.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0035-2007, BSI-CC-PP-0084-2014, BSI-CC-PP-0091-2017
Certificates
BSI-DSZ-CC-1088, BSI-DSZ-CC-0782-V5-2020
Certification process
Out of scope, A.3. RSA Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU.PK (conditional, possibly multiple) VU, by VU or VU man- ufacturer; obtained by card in VU certificate during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MS.PK (conditional, possibly multiple, foreign) MSCA; obtained by card in MS certifi- cate presented by a VU during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.1: First-generation asymmetric, inserted in card by card manufacturer. Note: See [REG_2016/799] An- nex 1C, Appendix 11, CSM_105. Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory, A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory EUR.PK (previous) (conditional; only, A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory 94 Key Symbol Description Purpose Type, EUR.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple, by VU or VU man- ufacturer; obtained by card in VU_MA certificate during mu- tual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MSCA_VU- EGF.PK (conditional, possibly, ECC Generated by MSCA; obtained by card in MSCA_VU-EGF cer- tificate during mutual authen- tication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.4: Second-generation asymmetric, section 12.2, a workshop card may contain up to three keys KM-WC (of consecutive key generations). Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory, DSRC channel AES Generated by ERCA Note: Workshop and control cards may contain up to 3 KMDSRC keys Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory

Side-channel analysis
Leak-Inherent, physical probing, SPA, DPA, timing attacks, Malfunction, malfunction
Certification process
Out of scope, A.3. RSA Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU.PK (conditional, possibly multiple) VU, by VU or VU man- ufacturer; obtained by card in VU certificate during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MS.PK (conditional, possibly multiple, foreign) MSCA; obtained by card in MS certifi- cate presented by a VU during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.1: First-generation asymmetric, inserted in card by card manufacturer. Note: See [REG_2016/799] An- nex 1C, Appendix 11, CSM_105. Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory, A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory EUR.PK (previous) (conditional; only, A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory 94 Key Symbol Description Purpose Type, EUR.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple, by VU or VU man- ufacturer; obtained by card in VU_MA certificate during mu- tual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MSCA_VU- EGF.PK (conditional, possibly, ECC Generated by MSCA; obtained by card in MSCA_VU-EGF cer- tificate during mutual authen- tication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.4: Second-generation asymmetric, section 12.2, a workshop card may contain up to three keys KM-WC (of consecutive key generations). Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory, DSRC channel AES Generated by ERCA Note: Workshop and control cards may contain up to 3 KMDSRC keys Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory

Standards
FIPS PUB 180-4, FIPS 180-1, FIPS 46-3, NIST SP 800-38B, NIST SP 800-67, NIST SP 800-90A, PKCS #1, AIS 31, RFC 5480, RFC 5639, RFC 5869, RFC 8017, ISO/IEC 7810, ISO/IEC 7816, ISO/IEC 10373, ISO/IEC 10116-2017, ISO/IEC 9796-2, ISO/IEC 19790:2012, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title: MTCOS Smart Tachograph V2 / SLE78CFX4000P- Security Target lite
Subject: Common Criteria Certification
Keywords: Common Criteria, CC, Digital Tachograph – Tachograph Card, MTCOS, EAL 4+
Author: MaskTech International GmbH
Creation date: D:20220406102943+02'00'
Modification date: D:20220406102943+02'00'
Pages: 102
Creator: LaTeX with hyperref
Producer: pdfTeX-1.40.20

References

Outgoing
  • BSI-DSZ-CC-0782-V5-2020 - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003, EC v1.02.013 or v2.07.003, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003, and Toolbox v1.02.013 or v2.07.003 libraries and with specific IC dedicated software (firmware)

Heuristics ?

Certificate ID: BSI-DSZ-CC-1088-2022

Extracted SARs

ASE_SPD.1, AGD_PRE.1, ALC_DVS.2, ASE_ECD.1, ASE_TSS.1, ALC_TAT.1, ALC_CMC.4, ALC_LCD.1, ATE_DPT.2, ADV_ARC.1, ADV_FSP.4, ASE_REQ.2, ALC_DEL.1, ATE_COV.2, ASE_CCL.1, ASE_INT.1, AVA_VAN.2, ADV_TDS.3, AGD_OPE.1, ATE_FUN.1, ADV_IMP.1, ATE_IND.2, ALC_FLR.1, ASE_OBJ.2, ALC_CMS.4

Scheme data ?

Cert Id BSI-DSZ-CC-1088-2022
Product MTCOS Smart Tachograph V2 / SLE78CFX4000P
Vendor MaskTech International GmbH
Certification Date 03.06.2022
Category Digital tachograph
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitaler_Tachograph-Tachographkarten/1088.html
Enhanced
Product MTCOS Smart Tachograph V2 / SLE78CFX4000P
Applicant MaskTech International GmbH Nordostpark 45 90411 Nürnberg
Evaluation Facility SRC Security Research & Consulting GmbH
Assurance Level EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5
Protection Profile Digital Tachograph - Tachograph Card (TC PP) Version 1.0, 19 May 2017, BSI-CC-PP-0091-2017
Certification Date 03.06.2022
Expiration Date 02.06.2027
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088a_pdf.pdf?__blob=publicationFile&v=3
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088b_pdf.pdf?__blob=publicationFile&v=4
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088c_pdf.pdf?__blob=publicationFile&v=3
Description The Target of Evaluation (TOE) is a second generation version 2 Tachograph Card in the sense of COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 and COMMISSION IMPLEMENTING REGULATION (EU) 2021/1228, Annex 1C. It is intended to be used in the 1st generation and 2nd generation version 2 Digital Tachograph Systems, which contain additionally further components as motion sensors (of the 1st or 2nd generation), vehicle units (of the 1st or 2nd generation), remote early detection communication readers and, if applicable, external GNSS modules and remote communication facilities. The TOE provides different configurations and is implemented in the four different card types as driver card, workshop card, control card and company card in accordance with the Digital Tachograph System specifications given by COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 and COMMISSION IMPLEMENTING REGULATION (EU) 2021/1228, Annex 1C, Appendix 2, Appendix 10 and Appendix 11.
Subcategory Tachograph Cards

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '97e00bc334faad13502bca895f4f5d0aa605613a0b663105028351cedab504b7', 'txt_hash': '840d0f1e1211b4bc8f0553ff9d798ba83c485839d7cd10358edab9fc3233af0a'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '33394a7032ca4335ff61bd3e138e13063f36abce3cebc28487b8486f74508ad0', 'txt_hash': '534603bc706d53f9ec1cbda9b247e73d4f7e29b1cefaec027b0ec5a52f75f086'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4c019f72119f887708ad55572366079d38178695e03bb801a748941c6a59a5ea', 'txt_hash': '2abc57df05096772ca5877415e6912b6eab62da43ffa0d2cd392b5bfd1e31abe'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 254122, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20220613083859+02'00'", '/Creator': 'Writer', '/Keywords': 'Common Criteria, Certification, Zertifizierung, Tachograph Card', '/ModDate': "D:20220613084333+02'00'", '/Producer': 'LibreOffice 6.3', '/Subject': 'Common Criteria Certification', '/Title': 'Certificate BSI-DSZ-CC-1088-2022', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1088-2022': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0091-2017': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'ATE': {'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '1088c_pdf.pdf'}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1088-2022', 'cert_item': 'MTCOS Smart Tachograph V2 / SLE78CFX4000P', 'developer': 'MaskTech International GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Digital Tachograph - Tachograph Card (TC PP) Version 1.0, 19 May 2017, BSI-CC-PP-0091-2017', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1088-2022': 20}, '__delete__': ['BSI-DSZ-CC-0782-V5']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1088': 2}, '__update__': {'BSI-DSZ-CC-0782-V5-2020': 1}, '__delete__': ['BSI-DSZ-CC-0782-V5']}}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0782-V5': 24}, '__update__': {'BSI-DSZ-CC-1088-2022': 40}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0782-V5': 3}, '__update__': {'BSI-DSZ-CC-0782-V5-2020': 2}, '__delete__': ['BSI-DSZ-CC-1088']}}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1088-2022': 20}, '__delete__': ['BSI-DSZ-CC-0782-V5']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1088': 2}, '__update__': {'BSI-DSZ-CC-0782-V5-2020': 1}, '__delete__': ['BSI-DSZ-CC-0782-V5']}}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'BSI-DSZ-CC-1088-2022', 'product': 'MTCOS Smart Tachograph V2 / SLE78CFX4000P', 'vendor': 'MaskTech International GmbH', 'certification_date': '03.06.2022', 'category': 'Digital tachograph', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitaler_Tachograph-Tachographkarten/1088.html', 'enhanced': {'product': 'MTCOS Smart Tachograph V2 / SLE78CFX4000P', 'applicant': 'MaskTech International GmbH\nNordostpark 45 \n90411 Nürnberg', 'evaluation_facility': 'SRC Security Research & Consulting GmbH', 'assurance_level': 'EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5', 'protection_profile': 'Digital Tachograph - Tachograph Card (TC PP) Version 1.0, 19 May 2017, BSI-CC-PP-0091-2017', 'certification_date': '03.06.2022', 'expiration_date': '02.06.2027', 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088a_pdf.pdf?__blob=publicationFile&v=3', 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088b_pdf.pdf?__blob=publicationFile&v=4', 'cert_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088c_pdf.pdf?__blob=publicationFile&v=3', 'description': 'The Target of Evaluation (TOE) is a second generation version 2 Tachograph Card in the sense of COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 and COMMISSION IMPLEMENTING REGULATION (EU) 2021/1228, Annex 1C. It is intended to be used in the 1st generation and 2nd generation version 2 Digital Tachograph Systems, which contain additionally further components as motion sensors (of the 1st or 2nd generation), vehicle units (of the 1st or 2nd generation), remote early detection communication readers and, if applicable, external GNSS modules and remote communication facilities.\n \nThe TOE provides different configurations and is implemented in the four different card types as driver card, workshop card, control card and company card in accordance with the Digital Tachograph System specifications given by COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 and COMMISSION IMPLEMENTING REGULATION (EU) 2021/1228, Annex 1C, Appendix 2, Appendix 10 and Appendix 11.'}, 'subcategory': 'Tachograph Cards'}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is https://www.commoncriteriaportal.org/files/epfiles/1088c_pdf.pdf.

    The manufacturer_web was updated.

    • The new value is https://www.masktech.de/.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Digital Tachograph - Tachograph Card', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0091b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['TC_PP']}}]}.

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/1088a_pdf.pdf, code: nok'].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The cert_link was updated.

    • The new value is None.

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'TC_PP', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 33394a7032ca4335ff61bd3e138e13063f36abce3cebc28487b8486f74508ad0.
    • The st_txt_hash property was set to 534603bc706d53f9ec1cbda9b247e73d4f7e29b1cefaec027b0ec5a52f75f086.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 487471, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 102, '/Author': 'MaskTech International GmbH', '/Title': 'MTCOS Smart Tachograph V2 / SLE78CFX4000P- Security Target lite', '/Subject': 'Common Criteria Certification', '/Creator': 'LaTeX with hyperref', '/Producer': 'pdfTeX-1.40.20', '/Keywords': 'Common Criteria, CC, Digital Tachograph – Tachograph Card, MTCOS, EAL 4+', '/CreationDate': "D:20220406102943+02'00'", '/ModDate': "D:20220406102943+02'00'", '/Trapped': '/False', '/PTEX.Fullbanner': 'This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019/Cygwin) kpathsea version 6.3.1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-V5-2020': 2, 'BSI-DSZ-CC-0782-V5': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 2, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0091-2017': 1}}, 'cc_security_level': {'EAL': {'EAL4': 15, 'EAL6': 2, 'EAL4 augmented': 5, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_TDS.3': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 11, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_FLR.1': 1}, 'ATE': {'ATE_DPT.2': 11, 'ATE_FUN.1': 2, 'ATE_DPT.1': 1, 'ATE_COV.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 11}, 'ASE': {'ASE_INT.1': 3, 'ASE_CCL.1': 3, 'ASE_SPD.1': 3, 'ASE_OBJ.2': 3, 'ASE_ECD.1': 3, 'ASE_REQ.2': 3, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 9, 'FAU_SAA.1': 8, 'FAU_ARP.1.1': 1, 'FAU_GEN.1': 3, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO.1': 12, 'FCO_NRO.1.1': 1, 'FCO_NRO.1.2': 1, 'FCO_NRO.1.3': 1}, 'FCS': {'FCS_RNG': 5, 'FCS_RNG.1': 17, 'FCS_CKM.1': 30, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 105, 'FCS_CKM.2': 10, 'FCS_CKM.4': 29, 'FCS_COP': 79, 'FCS_COP.1': 20}, 'FDP': {'FDP_ACC': 26, 'FDP_ACC.2': 8, 'FDP_ACF': 23, 'FDP_ACF.1': 16, 'FDP_DAU.1': 12, 'FDP_ETC.1': 7, 'FDP_ETC.2': 6, 'FDP_ITC.1': 39, 'FDP_ITC.2': 41, 'FDP_RIP.1': 8, 'FDP_SDI.2': 14, 'FDP_ACC.1': 11, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_IFC.1': 8, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ITC.2.1': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 1, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 2, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_SOS.2': 1, 'FIA_AFL': 23, 'FIA_AFL.1': 8, 'FIA_ATD': 14, 'FIA_ATD.1': 8, 'FIA_UAU.3': 12, 'FIA_UAU.4': 8, 'FIA_UID.2': 10, 'FIA_USB': 13, 'FIA_USB.1': 7, 'FIA_UAU': 20, 'FIA_UAU.1': 14, 'FIA_UID.1': 7, 'FIA_UAU.3.1': 1, 'FIA_UAU.3.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MSA.3': 8, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_MSA.1': 1, 'FMT_SMF.1': 1}, 'FPR': {'FPR_UNO.1': 12}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 18, 'FPT_EMS.1.1': 2, 'FPT_EMS.1.2': 2, 'FPT_FLS.1': 10, 'FPT_PHP.3': 14, 'FPT_TST.1': 10, 'FPT_TDC': 18, 'FPT_TDC.1': 8, 'FPT_ITC.1': 1, 'FPT_FLS.1.1': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 16, 'FTP_ITC.1': 9, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RND': 1}, 'OE': {'OE.EOL': 4}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 6, 'Infineon': 4}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 40}}, 'DES': {'DES': {'DES': 6}, '3DES': {'TDES': 17, '3DES': 5, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 2, 'KMAC': 1, 'CMAC': 10}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 11}, 'ECC': {'ECC': 14}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 10}, 'SHA2': {'SHA-256': 7, 'SHA-384': 3, 'SHA-512': 3, 'SHA-224': 1, 'SHA-2': 7}}}, 'crypto_scheme': {'MAC': {'MAC': 6}, 'KA': {'Key agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RNG': 7, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 10}}, 'ecc_curve': {'NIST': {'P-256': 1, 'P-384': 1, 'P-521': 1, 'NIST P-256': 1, 'NIST P-384': 1, 'NIST P-521': 1, 'secp256r1': 4, 'secp384r1': 1, 'secp521r1': 4}, 'Brainpool': {'brainpoolP256r1': 4, 'brainpoolP384r1': 1, 'brainpoolP512r1': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'physical probing': 5, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'Malfunction': 1, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 1, 'FIPS 180-1': 2, 'FIPS 46-3': 1}, 'NIST': {'NIST SP 800-38B': 1, 'NIST SP 800-67': 1, 'NIST SP 800-90A': 1}, 'PKCS': {'PKCS #1': 1}, 'BSI': {'AIS 31': 1}, 'RFC': {'RFC 5480': 1, 'RFC 5639': 1, 'RFC 5869': 1, 'RFC 8017': 1}, 'ISO': {'ISO/IEC 7810': 2, 'ISO/IEC 7816': 4, 'ISO/IEC 10373': 2, 'ISO/IEC 10116-2017': 1, 'ISO/IEC 9796-2': 1, 'ISO/IEC 19790:2012': 1}, 'ICAO': {'ICAO': 2}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'Out of scope': 11, 'A.3. RSA Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU.PK (conditional, possibly multiple) VU': 1, 'by VU or VU man- ufacturer; obtained by card in VU certificate during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MS.PK (conditional, possibly multiple': 1, 'foreign) MSCA; obtained by card in MS certifi- cate presented by a VU during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.1: First-generation asymmetric': 1, 'inserted in card by card manufacturer. Note: See [REG_2016/799] An- nex 1C, Appendix 11, CSM_105. Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory': 1, 'A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory EUR.PK (previous) (conditional; only': 1, 'A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory 94 Key Symbol Description Purpose Type': 1, 'EUR.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple': 1, 'by VU or VU man- ufacturer; obtained by card in VU_MA certificate during mu- tual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MSCA_VU- EGF.PK (conditional, possibly': 1, 'ECC Generated by MSCA; obtained by card in MSCA_VU-EGF cer- tificate during mutual authen- tication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.4: Second-generation asymmetric': 1, 'section 12.2, a workshop card may contain up to three keys KM-WC (of consecutive key generations). Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory': 1, 'DSRC channel AES Generated by ERCA Note: Workshop and control cards may contain up to 3 KMDSRC keys Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory': 1}}}.
    • The st_filename property was set to 1088b_pdf.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V5-2020']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V5-2020']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values added.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/1088b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values discarded.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Digital Tachograph - Tachograph Card', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0091b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['TC_PP']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Digital Tachograph - Tachograph Card', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0091b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V5']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V5']}}} data.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '1088a_pdf.pdf', 'st_filename': '1088b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1088-2022': 40}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 5}}}}, 'cc_sar': {'__update__': {'ALC': {'__insert__': {'ALC_FLR.1': 1}}, 'AVA': {'__update__': {'AVA_VAN.5': 4}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__delete__': ['DH']}}, '__delete__': ['DSA']}}}, 'crypto_library': {'__delete__': ['NSS']}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__update__': {'ISO/IEC 18045': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'__insert__': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Digital Tachograph – Tachograph Card, Version 1.0, 10 March 2022, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1088-2022, Security Target lite – MTCOS Smart Tachograph V2 ': 1, 'Tachograph V2 / SLE78CFX4000P, Version 1.5, 12 May 2022, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-1088-2022, Configuration List – MTCOS Smart Tachograph V2 ': 1, 'Version 0.6, 10 May 2022, MaskTech International GmbH (confidential document) [11] User Guidance BSI-DSZ-CC-1088-2022, User Guidance – MTCOS Smart Tachograph V2 / SLE78CFX4000P': 1, 'Criteria CCv3.1 EAL6 augmented (EAL6+), Version 4.1, 21 October 2020, Infineon Technologies AG (confidential document) Security Target Lite BSI-DSZ-CC-0782-V5, Security Target Lite M7892 B11 Recertification Common': 1}, '__delete__': ['identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification', '00P, Digital Tachograph – Tachograph Card, Version 1.0, 10 March 2022, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1088-2022, Security Target lite – MTCOS Smart Tachograph V2 ', 't Tachograph V2 / SLE78CFX4000P, Version 1.5, 12 May 2022, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-1088-2022, Configuration List – MTCOS Smart Tachograph V2 ', 'SLE78CFX4000P, Version 0.6, 10 May 2022, MaskTech International GmbH (confidential document) [11] User Guidance BSI-DSZ-CC-1088-2022, User Guidance – MTCOS Smart Tachograph V2 / SLE78CFX4000P', 'mon Criteria CCv3.1 EAL6 augmented (EAL6+), Version 4.1, 21 October 2020, Infineon Technologies AG (confidential document) Security Target Lite BSI-DSZ-CC-0782-V5, Security Target Lite M7892 B11 Recertification Common']}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_ARC.1': 3, 'ADV_TDS.3': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2}}, 'AGD': {'__update__': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}}, 'ALC': {'__update__': {'ALC_DVS.2': 11}}, 'ATE': {'__update__': {'ATE_DPT.2': 11, 'ATE_FUN.1': 2}}, 'AVA': {'__update__': {'AVA_VAN.5': 11}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAA.1': 8}}, 'FCS': {'__insert__': {'FCS_CKM': 105, 'FCS_COP': 79}, '__update__': {'FCS_RNG': 5, 'FCS_RNG.1': 17, 'FCS_CKM.1': 30, 'FCS_CKM.2': 10, 'FCS_CKM.4': 29, 'FCS_COP.1': 20}}, 'FDP': {'__insert__': {'FDP_ACC': 26, 'FDP_ACF': 23}, '__update__': {'FDP_ACC.2': 8, 'FDP_ACF.1': 16, 'FDP_ETC.2': 6, 'FDP_SDI.2': 14, 'FDP_ACC.1': 11, 'FDP_IFC.1': 8}}, 'FIA': {'__insert__': {'FIA_AFL': 23, 'FIA_ATD': 14, 'FIA_USB': 13, 'FIA_UAU': 20}, '__update__': {'FIA_AFL.1': 8, 'FIA_ATD.1': 8, 'FIA_UAU.4': 8, 'FIA_USB.1': 7, 'FIA_UAU.1': 14}}, 'FPT': {'__insert__': {'FPT_TDC': 18}, '__update__': {'FPT_EMS': 5, 'FPT_FLS.1': 10, 'FPT_TDC.1': 8}, '__delete__': ['FPT_ITT.1', 'FPT_TST.2']}, 'FTP': {'__insert__': {'FTP_ITC': 16}, '__update__': {'FTP_ITC.1': 9}}}}, 'cc_claims': {'__delete__': ['A', 'R']}, 'vendor': {'__update__': {'Infineon': {'__update__': {'Infineon Technologies AG': 6}, '__delete__': ['Infineon Technologies']}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 40}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 6}, '__delete__': ['DEA']}, '3DES': {'__update__': {'TDES': 17}, '__delete__': ['Triple-DES']}}}, 'constructions': {'__update__': {'MAC': {'__update__': {'CMAC': 10}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECC': {'__update__': {'ECC': 14}}}}}, '__delete__': ['FF']}, 'hash_function': {'__update__': {'SHA': {'__update__': {'SHA1': {'__update__': {'SHA-1': 10}, '__delete__': ['SHA1']}, 'SHA2': {'__update__': {'SHA-2': 7}, '__delete__': ['SHA2']}}}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 6}}, 'KA': {'__delete__': ['KA']}}}, 'randomness': {'__update__': {'TRNG': {'__update__': {'TRNG': 2}}, 'RNG': {'__update__': {'RNG': 7}}}}, 'cipher_mode': {'__update__': {'CBC': {'__update__': {'CBC': 10}}}}, 'ecc_curve': {'__update__': {'NIST': {'__update__': {'secp384r1': 1}}, 'Brainpool': {'__update__': {'brainpoolP384r1': 1}}}}, 'crypto_library': {}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'physical probing': 5}}}}, 'standard_id': {'__update__': {'BSI': {'__delete__': ['AIS31']}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'by VU or VU man- ufacturer; obtained by card in VU certificate during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MS.PK (conditional, possibly multiple': 1, 'foreign) MSCA; obtained by card in MS certifi- cate presented by a VU during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.1: First-generation asymmetric': 1, 'inserted in card by card manufacturer. Note: See [REG_2016/799] An- nex 1C, Appendix 11, CSM_105. Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory': 1, 'EUR.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple': 1, 'by VU or VU man- ufacturer; obtained by card in VU_MA certificate during mu- tual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MSCA_VU- EGF.PK (conditional, possibly': 1}, '__delete__': ['.3. RSA Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU.PK (conditional, possibly multiple', '.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory EUR.PK (previous', '.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple', 'nerated by VU or VU man- ufacturer; obtained by card in VU certificate during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MS.PK (conditional, possibly multiple', '(foreign) MSCA; obtained by card in MS certifi- cate presented by a VU during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.1: First-generation asymmetric', '; inserted in card by card manufacturer. Note: See [REG_2016/799] An- nex 1C, Appendix 11, CSM_105. Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory', 'f EUR.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple', 'ed by VU or VU man- ufacturer; obtained by card in VU_MA certificate during mu- tual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MSCA_VU- EGF.PK (conditional, possibly']}}}} data.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Digital Tachograph - Tachograph Card', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0091b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['TC_PP']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.sogis.eu/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/']}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1088-2022': 68, 'BSI-DSZ-CC-0782-V5': 24}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0091-2017': 4, 'BSI-CC-PP-0091': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 4, 'EAL 5': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 6': 2, 'EAL5+': 1, 'EAL6': 3, 'EAL 5+': 1, 'EAL6+': 2, 'EAL 4 augmented': 3, 'EAL 6 augmented': 1, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_FLR': 2, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 4}, 'AVA': {'AVA_VAN.5': 3}}, 'cc_sfr': {}, 'cc_claims': {'OE': {'OE.EOL': 1}}, 'vendor': {'Infineon': {'Infineon': 6, 'Infineon Technologies AG': 11}}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 1}, 'SRC': {'SRC Security Research & Consulting': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'DH': 2, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {'NIST': {'P-256': 1, 'P-384': 1, 'P-521': 1, 'NIST P-256': 1, 'NIST P-384': 1, 'NIST P-521': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 4}, 'NSS': {'NSS': 3}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}, 'FI': {'malfunction': 1}, 'other': {'JIL': 6}}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 4, 'AIS 36': 4, 'AIS 37': 3, 'AIS 26': 4, 'AIS 25': 4, 'AIS 20': 3, 'AIS 31': 3, 'AIS 46': 3, 'AIS 35': 2, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 32': 1, 'AIS 38': 1}, 'RFC': {'RFC 5480': 1, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 17065': 2, 'ISO/IEC 18045': 2, 'ISO/IEC 7816': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, '00P, Digital Tachograph – Tachograph Card, Version 1.0, 10 March 2022, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1088-2022, Security Target lite – MTCOS Smart Tachograph V2 ': 1, 't Tachograph V2 / SLE78CFX4000P, Version 1.5, 12 May 2022, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-1088-2022, Configuration List – MTCOS Smart Tachograph V2 ': 1, 'SLE78CFX4000P, Version 0.6, 10 May 2022, MaskTech International GmbH (confidential document) [11] User Guidance BSI-DSZ-CC-1088-2022, User Guidance – MTCOS Smart Tachograph V2 / SLE78CFX4000P': 1, 'mon Criteria CCv3.1 EAL6 augmented (EAL6+), Version 4.1, 21 October 2020, Infineon Technologies AG (confidential document) Security Target Lite BSI-DSZ-CC-0782-V5, Security Target Lite M7892 B11 Recertification Common': 1, 'for Composite Evaluation (ETR COMP), BSI-DSZ-CC- 0782-V5, Version 5, TÃœV Informationstechnik GmbH (confidential document) [15] COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 of 18 March 2016 implementing Regulation (EU': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-V5-2020': 2, 'BSI-DSZ-CC-0782-V5': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 2, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0091-2017': 1}}, 'cc_security_level': {'EAL': {'EAL4': 15, 'EAL6': 2, 'EAL4 augmented': 5, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_TDS.3': 5, 'ADV_FSP.4': 3, 'ADV_IMP.1': 3}, 'AGD': {'AGD_OPE.1': 3, 'AGD_PRE.1': 3}, 'ALC': {'ALC_DVS.2': 10, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_FLR.1': 1}, 'ATE': {'ATE_DPT.2': 12, 'ATE_FUN.1': 3, 'ATE_DPT.1': 1, 'ATE_COV.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 9}, 'ASE': {'ASE_INT.1': 3, 'ASE_CCL.1': 3, 'ASE_SPD.1': 3, 'ASE_OBJ.2': 3, 'ASE_ECD.1': 3, 'ASE_REQ.2': 3, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 9, 'FAU_SAA.1': 13, 'FAU_ARP.1.1': 1, 'FAU_GEN.1': 3, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO.1': 12, 'FCO_NRO.1.1': 1, 'FCO_NRO.1.2': 1, 'FCO_NRO.1.3': 1}, 'FCS': {'FCS_RNG': 4, 'FCS_RNG.1': 16, 'FCS_CKM.1': 27, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.2': 8, 'FCS_CKM.4': 26, 'FCS_COP.1': 13}, 'FDP': {'FDP_ACC.2': 4, 'FDP_ACF.1': 10, 'FDP_DAU.1': 12, 'FDP_ETC.1': 7, 'FDP_ETC.2': 7, 'FDP_ITC.1': 39, 'FDP_ITC.2': 41, 'FDP_RIP.1': 8, 'FDP_SDI.2': 16, 'FDP_ACC.1': 15, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_IFC.1': 9, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ITC.2.1': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 1, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 2, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_SOS.2': 1, 'FIA_AFL.1': 2, 'FIA_ATD.1': 6, 'FIA_UAU.3': 12, 'FIA_UAU.4': 10, 'FIA_UID.2': 10, 'FIA_USB.1': 1, 'FIA_UAU.1': 8, 'FIA_UID.1': 7, 'FIA_UAU.3.1': 1, 'FIA_UAU.3.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MSA.3': 8, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_MSA.1': 1, 'FMT_SMF.1': 1}, 'FPR': {'FPR_UNO.1': 12}, 'FPT': {'FPT_EMS': 4, 'FPT_EMS.1': 18, 'FPT_EMS.1.1': 2, 'FPT_EMS.1.2': 2, 'FPT_FLS.1': 11, 'FPT_PHP.3': 14, 'FPT_TST.1': 10, 'FPT_TDC.1': 4, 'FPT_ITC.1': 1, 'FPT_FLS.1.1': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_ITT.1': 1, 'FPT_TST.2': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 3, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RND': 1}, 'A': {'A.SK': 1, 'A.PK': 2, 'A.C': 4}, 'R': {'R.PK': 6, 'R.KID': 2, 'R.C': 9, 'R.SK': 3}, 'OE': {'OE.EOL': 4}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 4, 'Infineon': 4, 'Infineon Technologies': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 58}}, 'DES': {'DES': {'DES': 43, 'DEA': 1}, '3DES': {'TDES': 31, '3DES': 5, 'Triple-DES': 1, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 2, 'KMAC': 1, 'CMAC': 14}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 11}, 'ECC': {'ECC': 27}}, 'FF': {'DH': {'DH': 5}, 'DSA': {'DSA': 11}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA1': 7, 'SHA-1': 11}, 'SHA2': {'SHA-256': 7, 'SHA-384': 3, 'SHA-512': 3, 'SHA-224': 1, 'SHA2': 7, 'SHA-2': 8}}}, 'crypto_scheme': {'MAC': {'MAC': 22}, 'KA': {'KA': 1, 'Key agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 5}, 'RNG': {'RNG': 20, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 16}}, 'ecc_curve': {'NIST': {'P-256': 1, 'P-384': 1, 'P-521': 1, 'NIST P-256': 1, 'NIST P-384': 1, 'NIST P-521': 1, 'secp256r1': 4, 'secp384r1': 4, 'secp521r1': 4}, 'Brainpool': {'brainpoolP256r1': 4, 'brainpoolP384r1': 4, 'brainpoolP512r1': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 4}, 'NSS': {'NSS': 8}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'physical probing': 1, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'Malfunction': 1, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 1, 'FIPS 180-1': 2, 'FIPS 46-3': 1}, 'NIST': {'NIST SP 800-38B': 1, 'NIST SP 800-67': 1, 'NIST SP 800-90A': 1}, 'PKCS': {'PKCS #1': 1}, 'BSI': {'AIS31': 2, 'AIS 31': 1}, 'RFC': {'RFC 5480': 1, 'RFC 5639': 1, 'RFC 5869': 1, 'RFC 8017': 1}, 'ISO': {'ISO/IEC 7810': 2, 'ISO/IEC 7816': 4, 'ISO/IEC 10373': 2, 'ISO/IEC 10116-2017': 1, 'ISO/IEC 9796-2': 1, 'ISO/IEC 19790:2012': 1}, 'ICAO': {'ICAO': 2}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'Out of scope': 11, '.3. RSA Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU.PK (conditional, possibly multiple': 1, '.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory EUR.PK (previous': 1, '.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple': 1, 'A.3. RSA Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU.PK (conditional, possibly multiple) VU': 1, 'nerated by VU or VU man- ufacturer; obtained by card in VU certificate during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MS.PK (conditional, possibly multiple': 1, '(foreign) MSCA; obtained by card in MS certifi- cate presented by a VU during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.1: First-generation asymmetric': 1, '; inserted in card by card manufacturer. Note: See [REG_2016/799] An- nex 1C, Appendix 11, CSM_105. Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory': 1, 'A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory EUR.PK (previous) (conditional; only': 1, 'A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory 94 Key Symbol Description Purpose Type': 1, 'f EUR.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple': 1, 'ed by VU or VU man- ufacturer; obtained by card in VU_MA certificate during mu- tual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MSCA_VU- EGF.PK (conditional, possibly': 1, 'ECC Generated by MSCA; obtained by card in MSCA_VU-EGF cer- tificate during mutual authen- tication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.4: Second-generation asymmetric': 1, 'section 12.2, a workshop card may contain up to three keys KM-WC (of consecutive key generations). Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory': 1, 'DSRC channel AES Generated by ERCA Note: Workshop and control cards may contain up to 3 KMDSRC keys Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 25.06.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name MTCOS Smart Tachograph V2 / SLE78CFX4000P was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/1088c_pdf.pdf",
  "dgst": "7b1efef5807fbf94",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1088-2022",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Digital tachograph",
      "cert_id": "BSI-DSZ-CC-1088-2022",
      "certification_date": "03.06.2022",
      "enhanced": {
        "applicant": "MaskTech International GmbH\nNordostpark 45 \n90411 N\u00fcrnberg",
        "assurance_level": "EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088c_pdf.pdf?__blob=publicationFile\u0026v=3",
        "certification_date": "03.06.2022",
        "description": "The Target of Evaluation (TOE) is a second generation version 2 Tachograph Card in the sense of COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 and COMMISSION IMPLEMENTING REGULATION (EU) 2021/1228, Annex 1C. It is intended to be used in the 1st generation and 2nd generation version 2 Digital Tachograph Systems, which contain additionally further components as motion sensors (of the 1st or 2nd generation), vehicle units (of the 1st or 2nd generation), remote early detection communication readers and, if applicable, external GNSS modules and remote communication facilities.\n \nThe TOE provides different configurations and is implemented in the four different card types as driver card, workshop card, control card and company card in accordance with the Digital Tachograph System specifications given by COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 and COMMISSION IMPLEMENTING REGULATION (EU) 2021/1228, Annex 1C, Appendix 2, Appendix 10 and Appendix 11.",
        "evaluation_facility": "SRC Security Research \u0026 Consulting GmbH",
        "expiration_date": "02.06.2027",
        "product": "MTCOS Smart Tachograph V2 / SLE78CFX4000P",
        "protection_profile": "Digital Tachograph - Tachograph Card (TC PP) Version 1.0, 19 May 2017, BSI-CC-PP-0091-2017",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088a_pdf.pdf?__blob=publicationFile\u0026v=3",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088b_pdf.pdf?__blob=publicationFile\u0026v=4"
      },
      "product": "MTCOS Smart Tachograph V2 / SLE78CFX4000P",
      "subcategory": "Tachograph Cards",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitaler_Tachograph-Tachographkarten/1088.html",
      "vendor": "MaskTech International GmbH"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-V5-2020"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-V5-2020"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "MaskTech International GmbH",
  "manufacturer_web": "https://www.masktech.de/",
  "name": "MTCOS Smart Tachograph V2 / SLE78CFX4000P",
  "not_valid_after": "2027-06-03",
  "not_valid_before": "2022-06-03",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1088c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1088-2022": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0091-2017": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "ATE": {
          "ATE_DPT.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20220613083859+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, Tachograph Card",
      "/ModDate": "D:20220613084333+02\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certificate BSI-DSZ-CC-1088-2022",
      "pdf_file_size_bytes": 254122,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1088a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1088-2022",
        "cert_item": "MTCOS Smart Tachograph V2 / SLE78CFX4000P",
        "cert_lab": "BSI",
        "developer": "MaskTech International GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Digital Tachograph - Tachograph Card (TC PP) Version 1.0, 19 May 2017, BSI-CC-PP-0091-2017"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 3
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1088-2022": 20
        }
      },
      "cc_claims": {
        "OE": {
          "OE.EOL": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0091": 1,
          "BSI-CC-PP-0091-2017": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 5,
          "ALC_FLR": 2,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_DPT.2": 4
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 5,
          "EAL 4 augmented": 3,
          "EAL 5": 4,
          "EAL 5+": 1,
          "EAL 6": 2,
          "EAL 6 augmented": 1,
          "EAL5+": 1,
          "EAL6": 3,
          "EAL6 augmented": 2,
          "EAL6+": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Criteria CCv3.1 EAL6 augmented (EAL6+), Version 4.1, 21 October 2020, Infineon Technologies AG (confidential document) Security Target Lite BSI-DSZ-CC-0782-V5, Security Target Lite M7892 B11 Recertification Common": 1,
          "Digital Tachograph \u2013 Tachograph Card, Version 1.0, 10 March 2022, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1088-2022, Security Target lite \u2013 MTCOS Smart Tachograph V2 ": 1,
          "Tachograph V2 / SLE78CFX4000P, Version 1.5, 12 May 2022, SRC Security Research \u0026 Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-1088-2022, Configuration List \u2013 MTCOS Smart Tachograph V2 ": 1,
          "Version 0.6, 10 May 2022, MaskTech International GmbH (confidential document) [11] User Guidance BSI-DSZ-CC-1088-2022, User Guidance \u2013 MTCOS Smart Tachograph V2 / SLE78CFX4000P": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "for Composite Evaluation (ETR COMP), BSI-DSZ-CC- 0782-V5, Version 5, T\u00dcV Informationstechnik GmbH (confidential document) [15] COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 of 18 March 2016 implementing Regulation (EU": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 4
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-256": 1,
          "NIST P-384": 1,
          "NIST P-521": 1,
          "P-256": 1,
          "P-384": 1,
          "P-521": 1
        }
      },
      "eval_facility": {
        "SRC": {
          "SRC Security Research \u0026 Consulting": 3
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        },
        "SCA": {
          "side channel": 1
        },
        "other": {
          "JIL": 6
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 14": 1,
          "AIS 19": 1,
          "AIS 20": 3,
          "AIS 25": 4,
          "AIS 26": 4,
          "AIS 31": 3,
          "AIS 32": 1,
          "AIS 34": 4,
          "AIS 35": 2,
          "AIS 36": 4,
          "AIS 37": 3,
          "AIS 38": 1,
          "AIS 46": 3
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 7816": 2
        },
        "RFC": {
          "RFC 5480": 1,
          "RFC 5639": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        },
        "DES": {
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 6,
          "Infineon Technologies AG": 11
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20220613082516+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Tachograph Card\"",
      "/ModDate": "D:20220613084257+02\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-1088-2022",
      "pdf_file_size_bytes": 632204,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "1088b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDH": {
            "ECDH": 5
          },
          "ECDSA": {
            "ECDSA": 11
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0782-V5-2020": 1,
          "BSI-DSZ-CC-1088": 2
        }
      },
      "cc_claims": {
        "O": {
          "O.RND": 1
        },
        "OE": {
          "OE.EOL": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 2,
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0091-2017": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 3
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 11,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 3,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 3,
          "ASE_OBJ.2": 3,
          "ASE_REQ.2": 3,
          "ASE_SPD.1": 3,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 11,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 11
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 15,
          "EAL4 augmented": 5,
          "EAL6": 2,
          "EAL6 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 9,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 3,
          "FAU_SAA.1": 8,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAS.1": 1
        },
        "FCO": {
          "FCO_NRO.1": 12,
          "FCO_NRO.1.1": 1,
          "FCO_NRO.1.2": 1,
          "FCO_NRO.1.3": 1
        },
        "FCS": {
          "FCS_CKM": 105,
          "FCS_CKM.1": 30,
          "FCS_CKM.2": 10,
          "FCS_CKM.4": 29,
          "FCS_COP": 79,
          "FCS_COP.1": 20,
          "FCS_RNG": 5,
          "FCS_RNG.1": 17,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 26,
          "FDP_ACC.1": 11,
          "FDP_ACC.2": 8,
          "FDP_ACF": 23,
          "FDP_ACF.1": 16,
          "FDP_DAU.1": 12,
          "FDP_DAU.1.1": 1,
          "FDP_DAU.1.2": 1,
          "FDP_ETC.1": 7,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_ETC.2": 6,
          "FDP_ETC.2.1": 1,
          "FDP_ETC.2.2": 1,
          "FDP_ETC.2.3": 1,
          "FDP_ETC.2.4": 1,
          "FDP_IFC.1": 8,
          "FDP_ITC.1": 39,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 41,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.2": 1,
          "FDP_ITC.2.3": 1,
          "FDP_ITC.2.4": 1,
          "FDP_ITC.2.5": 1,
          "FDP_ITT.1": 1,
          "FDP_RIP.1": 8,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 14,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_AFL": 23,
          "FIA_AFL.1": 8,
          "FIA_ATD": 14,
          "FIA_ATD.1": 8,
          "FIA_SOS.2": 1,
          "FIA_UAU": 20,
          "FIA_UAU.1": 14,
          "FIA_UAU.3": 12,
          "FIA_UAU.3.1": 1,
          "FIA_UAU.3.2": 1,
          "FIA_UAU.4": 8,
          "FIA_UAU.4.1": 1,
          "FIA_UID.1": 7,
          "FIA_UID.2": 10,
          "FIA_UID.2.1": 1,
          "FIA_USB": 13,
          "FIA_USB.1": 7
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 8,
          "FMT_SMF.1": 1
        },
        "FPR": {
          "FPR_UNO.1": 12
        },
        "FPT": {
          "FPT_EMS": 5,
          "FPT_EMS.1": 18,
          "FPT_EMS.1.1": 2,
          "FPT_EMS.1.2": 2,
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_ITC.1": 1,
          "FPT_PHP.3": 14,
          "FPT_PHP.3.1": 1,
          "FPT_TDC": 18,
          "FPT_TDC.1": 8,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 16,
          "FTP_ITC.1": 9,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "A.3. RSA Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU.PK (conditional, possibly multiple) VU": 1,
          "A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory 94 Key Symbol Description Purpose Type": 1,
          "A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory EUR.PK (previous) (conditional; only": 1,
          "DSRC channel AES Generated by ERCA Note: Workshop and control cards may contain up to 3 KMDSRC keys Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory": 1,
          "ECC Generated by MSCA; obtained by card in MSCA_VU-EGF cer- tificate during mutual authen- tication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.4: Second-generation asymmetric": 1,
          "EUR.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple": 1,
          "Out of scope": 11,
          "by VU or VU man- ufacturer; obtained by card in VU certificate during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MS.PK (conditional, possibly multiple": 1,
          "by VU or VU man- ufacturer; obtained by card in VU_MA certificate during mu- tual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MSCA_VU- EGF.PK (conditional, possibly": 1,
          "foreign) MSCA; obtained by card in MS certifi- cate presented by a VU during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.1: First-generation asymmetric": 1,
          "inserted in card by card manufacturer. Note: See [REG_2016/799] An- nex 1C, Appendix 11, CSM_105. Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory": 1,
          "section 12.2, a workshop card may contain up to three keys KM-WC (of consecutive key generations). Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 10
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 4,
          "brainpoolP384r1": 1,
          "brainpoolP512r1": 4
        },
        "NIST": {
          "NIST P-256": 1,
          "NIST P-384": 1,
          "NIST P-521": 1,
          "P-256": 1,
          "P-384": 1,
          "P-521": 1,
          "secp256r1": 4,
          "secp384r1": 1,
          "secp521r1": 4
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 10
          },
          "SHA2": {
            "SHA-2": 7,
            "SHA-224": 1,
            "SHA-256": 7,
            "SHA-384": 3,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 7
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "malfunction": 1
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 1,
          "SPA": 1,
          "physical probing": 5,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2
        },
        "FIPS": {
          "FIPS 180-1": 2,
          "FIPS 46-3": 1,
          "FIPS PUB 180-4": 1
        },
        "ICAO": {
          "ICAO": 2
        },
        "ISO": {
          "ISO/IEC 10116-2017": 1,
          "ISO/IEC 10373": 2,
          "ISO/IEC 19790:2012": 1,
          "ISO/IEC 7810": 2,
          "ISO/IEC 7816": 4,
          "ISO/IEC 9796-2": 1
        },
        "NIST": {
          "NIST SP 800-38B": 1,
          "NIST SP 800-67": 1,
          "NIST SP 800-90A": 1
        },
        "PKCS": {
          "PKCS #1": 1
        },
        "RFC": {
          "RFC 5480": 1,
          "RFC 5639": 1,
          "RFC 5869": 1,
          "RFC 8017": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 40
          }
        },
        "DES": {
          "3DES": {
            "3DES": 5,
            "TDEA": 1,
            "TDES": 17
          },
          "DES": {
            "DES": 6
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 10,
            "HMAC": 2,
            "KMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SSC": 3
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 4,
          "Infineon Technologies AG": 6
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "MaskTech International GmbH",
      "/CreationDate": "D:20220406102943+02\u002700\u0027",
      "/Creator": "LaTeX with hyperref",
      "/Keywords": "Common Criteria, CC, Digital Tachograph \u2013 Tachograph Card, MTCOS, EAL 4+",
      "/ModDate": "D:20220406102943+02\u002700\u0027",
      "/PTEX.Fullbanner": "This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019/Cygwin) kpathsea version 6.3.1",
      "/Producer": "pdfTeX-1.40.20",
      "/Subject": "Common Criteria Certification",
      "/Title": "MTCOS Smart Tachograph V2 / SLE78CFX4000P- Security Target lite",
      "/Trapped": "/False",
      "pdf_file_size_bytes": 487471,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 102
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "TC_PP"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0091b_pdf.pdf",
        "pp_name": "Digital Tachograph - Tachograph Card"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/1088a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2",
      "AVA_VAN.2",
      "ATE_DPT.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/1088b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4c019f72119f887708ad55572366079d38178695e03bb801a748941c6a59a5ea",
      "txt_hash": "2abc57df05096772ca5877415e6912b6eab62da43ffa0d2cd392b5bfd1e31abe"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "97e00bc334faad13502bca895f4f5d0aa605613a0b663105028351cedab504b7",
      "txt_hash": "840d0f1e1211b4bc8f0553ff9d798ba83c485839d7cd10358edab9fc3233af0a"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "33394a7032ca4335ff61bd3e138e13063f36abce3cebc28487b8486f74508ad0",
      "txt_hash": "534603bc706d53f9ec1cbda9b247e73d4f7e29b1cefaec027b0ec5a52f75f086"
    }
  },
  "status": "active"
}