TCOS Passport Version 2.1 Release 2/P60D144

CSV information ?

Status archived
Valid from 22.08.2016
Valid until 22.08.2021
Scheme 🇩🇪 DE
Manufacturer T-Systems International GMBH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, AVA_VAN.5, ATE_DPT.2, ALC_DVS.2
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0808-V2-2016

Certification report ?

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
ECC
Protocols
PACE

Vendor
NXP

Security level
EAL 4, EAL 5, EAL 1, EAL 2, EAL5, EAL 5+, EAL 6, EAL 3, EAL 7, EAL 4 augmented, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_DPT.2, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011
Certificates
BSI-DSZ-CC-0808-2013, BSI-DSZ-CC-0978-2016, BSI-DSZ-CC-0808-V2-2016, BSI-DSZ-CC-0809-V2-2016
Evaluation facilities
TĂśV Informationstechnik, SRC Security Research & Consulting, T-Systems International
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, ETR) - TCOS Passport Version 2.1 Release 2/P60D144, SRC Security Research & Consulting GmbH (confidential document) 9 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für, Release VA/VA(Y/B/X)/VE, BSI-DSZ-CC-0978, Version 2, 17.12.2015, TÜV Informationstechnik GmbH (confidential document) [14] TR-03110, Advanced Security Mechanisms for Machine Readable Travel Documents – Extended, Passport Version 2.1 Release 2/P60D144, Version 1.13, 10.08.2016, T-Systems International GmbH (confidential document) [18] Certification Report BSI-DSZ-CC-0809-V2-2016 for TCOS Passport Version 2.1 Release 2-BAC

Side-channel analysis
side channel, fault injection, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, ETR) - TCOS Passport Version 2.1 Release 2/P60D144, SRC Security Research & Consulting GmbH (confidential document) 9 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für, Release VA/VA(Y/B/X)/VE, BSI-DSZ-CC-0978, Version 2, 17.12.2015, TÜV Informationstechnik GmbH (confidential document) [14] TR-03110, Advanced Security Mechanisms for Machine Readable Travel Documents – Extended, Passport Version 2.1 Release 2/P60D144, Version 1.13, 10.08.2016, T-Systems International GmbH (confidential document) [18] Certification Report BSI-DSZ-CC-0809-V2-2016 for TCOS Passport Version 2.1 Release 2-BAC

Standards
AIS 34, AIS 25, AIS 26, AIS 36, AIS 20, AIS 31, AIS 32, AIS 38, AIS36, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ICAO
Technical reports
BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-0808-V2-2016
Subject: Common Criteria Certification
Keywords: "Common Criteria, Certification, Zertifizierung, MRTD, ePass, TCOS, PACE, ID Card, Identity Card T-Systems"
Author: Bundesamt fĂĽr Sicherheit in der Informationstechnik
Creation date: D:20160901151510+02'00'
Modification date: D:20160901152526+02'00'
Pages: 36
Creator: Writer
Producer: LibreOffice 4.2

Frontpage

Certificate ID: BSI-DSZ-CC-0808-V2-2016
Certified item: TCOS Passport Version 2.1 Release 2/P60D144
Certification lab: BSI
Developer: T-Systems International GmbH

References

Outgoing Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, 3DES, Triple-DES, TDEA, KMAC, CMAC, CBC-MAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Protocols
PACE
Randomness
RND, RNG
Elliptic Curves
P-256, NIST P-256, secp256r1, brainpoolP192r1, brainpoolP224r1, brainpoolP256r1, brainpoolP320r1, brainpoolP384r1, brainpoolP512r1
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG13, EF.COM, EF.SOD
Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL 6+, EAL 4, EAL 6, EAL4 augmented, EAL 4 augmented, EAL 6 augmented
Claims
O.RND, O.HW_AES, O.CUST_RECONFIG, O.MEM_ACCESS, O.SFR_ACCESS, O.FW_HW, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FUN.1, ADV_FSP.4, ADV_IMP.1, ADV_ARC, ADV_FSP, ADV_TDS, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_DPT.1, ATE_DPT.3, ATE_COV.2, ATE_FUN.1, AVA_VAN.3, AVA_VAN.5, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_RND.1, FCS_RND.1.1, FCS_COP, FCS_CKM, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FCS_RNG.1, FDP_ACF, FDP_UCT, FDP_UIT, FDP_RIP, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_RIP.1.1, FDP_IFC.1, FDP_UCT.1, FDP_UIT.1, FDP_ITT.1, FDP_SDI.2, FIA_API, FIA_API.1, FIA_API.1.1, FIA_UAU, FIA_UID, FIA_AFL, FIA_UAU.4, FIA_UAU.5, FIA_UAU.1, FIA_AFL.1, FIA_UID.1, FIA_UAU.6, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR, FMT_MTD, FMT_MTD.3, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_MTD.1, FMT_MTD.3.1, FMT_MDT.3, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_FLS, FPT_TST, FPT_PHP, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP- 0056-V2-2012, BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0055, BSI-PP-0026, BSI-CC-PP- 0068-V2-2011, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0035-2007
Certificates
BSI-DSZ-CC-0808-V2
Evaluation facilities
T-Systems International

Side-channel analysis
Leak-Inherent, physical probing, Physical Probing, DPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS186, FIPS180, FIPS 197, FIPS 186, FIPS197, FIPS 180, FIPS PUB 180-4, FIPS PUB 186-4, PKCS#3, AIS36, AIS31, AIS 31, AIS 36, RFC5639, RFC 2631, RFC3369, RFC 5639, ISO/IEC 14443, ISO/IEC 7816-4, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title: Security Target TCOS Passport 2.1 Release 2 (NXP)
Subject: TCOS Passport Version 2.1 Release 2
Keywords: TCOS Passport, Electronic Passport, ePass, MRTD, PACE, EAC
Author: T-Systems International GmbH
Creation date: D:20160810091133+02'00'
Modification date: D:20160810091147+02'00'
Pages: 94
Creator: Acrobat PDFMaker 10.1 fĂĽr Word
Producer: Adobe PDF Library 10.0

References

Outgoing
Incoming

Heuristics ?

Certificate ID: BSI-DSZ-CC-0808-V2-2016

Extracted SARs

APE_INT.1, APE_ECD.1, APE_CCL.1, ATE_FUN.1, ALC_TAT.1, APE_REQ.2, ASE_CCL.1, ASE_INT.1, ADV_TDS.3, ADV_FUN.1, ALC_LCD.1, APE_OBJ.2, ASE_REQ.2, ASE_SPD.1, APE_SPD.1, ATE_DPT.2, ALC_CMS.4, ALC_DEL.1, AVA_VAN.5, ALC_FLR.1, ALC_DVS.2, ADV_SPM.1, ASE_TSS.2, AGD_PRE.1, AGD_OPE.1, ASE_OBJ.2, ALC_CMC.4, ATE_IND.3, ADV_INT.3, ADV_IMP.1, ASE_ECD.1, ADV_FSP.4, ATE_COV.2, ADV_ARC.1

References ?

Updates ?

  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to fa0e48d4bf014613527604772bc01b9931c618bb508874b82cb6a3c4f2c79bb8.
    • The st_txt_hash property was set to 47d48e6d5b4b3071b1138d705e6f22130d5f13ded570fc4b28fe144211a0e07c.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 756103, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 94, '/Author': 'T-Systems International GmbH', '/Company': 'T-Systems International GmbH', '/CreationDate': "D:20160810091133+02'00'", '/Creator': 'Acrobat PDFMaker 10.1 fĂĽr Word', '/Keywords': 'TCOS Passport, Electronic Passport, ePass, MRTD, PACE, EAC', '/ModDate': "D:20160810091147+02'00'", '/Producer': 'Adobe PDF Library 10.0', '/SourceModified': 'D:20160810070830', '/Subject': 'TCOS Passport Version 2.1 Release 2', '/Title': 'Security Target TCOS Passport 2.1 Release 2 (NXP)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz', 'http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0808-V2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP- 0056-V2-2012': 2, 'BSI-CC-PP-0068-V2-2011': 2, 'BSI-CC-PP-0055': 1, 'BSI-PP-0026': 1, 'BSI-CC-PP- 0068-V2-2011': 1, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL4': 11, 'EAL 6+': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL4 augmented': 2, 'EAL 4 augmented': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_TDS.3': 3, 'ADV_FUN.1': 1, 'ADV_FSP.4': 2, 'ADV_IMP.1': 4, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 7, 'ALC_FLR.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 5, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN.5': 8}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 6, 'FAU_SAS.1': 11, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 6, 'FCS_RND.1': 11, 'FCS_RND.1.1': 2, 'FCS_COP': 40, 'FCS_CKM': 38, 'FCS_CKM.1': 6, 'FCS_CKM.2': 4, 'FCS_COP.1': 12, 'FCS_CKM.4': 17, 'FCS_CKM.4.1': 1, 'FCS_RNG.1': 3}, 'FDP': {'FDP_ACF': 9, 'FDP_UCT': 6, 'FDP_UIT': 6, 'FDP_RIP': 3, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_RIP.1': 7, 'FDP_ACC': 8, 'FDP_ACF.1': 13, 'FDP_ACC.1': 5, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 3, 'FDP_UCT.1': 2, 'FDP_UIT.1': 3, 'FDP_ITT.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_API': 7, 'FIA_API.1': 10, 'FIA_API.1.1': 2, 'FIA_UAU': 54, 'FIA_UID': 11, 'FIA_AFL': 8, 'FIA_UAU.4': 2, 'FIA_UAU.5': 3, 'FIA_UAU.1': 3, 'FIA_AFL.1': 3, 'FIA_UID.1': 5, 'FIA_UAU.6': 2}, 'FMT': {'FMT_LIM': 5, 'FMT_LIM.1': 20, 'FMT_LIM.2': 18, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR': 9, 'FMT_MTD': 58, 'FMT_MTD.3': 8, 'FMT_MSA.3': 3, 'FMT_MSA.1': 2, 'FMT_SMF.1': 24, 'FMT_SMR.1': 13, 'FMT_SMF.1.1': 1, 'FMT_MTD.1': 5, 'FMT_MTD.3.1': 1, 'FMT_MDT.3': 1}, 'FPT': {'FPT_EMS': 6, 'FPT_EMS.1': 12, 'FPT_EMS.1.1': 5, 'FPT_EMS.1.2': 3, 'FPT_FLS.1': 10, 'FPT_TST.1': 6, 'FPT_PHP.3': 9, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3.1': 1, 'FPT_FLS': 1, 'FPT_TST': 1, 'FPT_PHP': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 10, 'FTP_ITC.1': 6, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RND': 2, 'O.HW_AES': 4, 'O.CUST_RECONFIG': 1, 'O.MEM_ACCESS': 2, 'O.SFR_ACCESS': 2, 'O.FW_HW': 1}, 'T': {'T.RND': 2}}, 'vendor': {'NXP': {'NXP': 5, 'NXP Semiconductors': 1}}, 'eval_facility': {'TSystems': {'T-Systems International': 100}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 17}}, 'DES': {'DES': {'DES': 7}, '3DES': {'TDES': 14, '3DES': 5, 'Triple-DES': 2, 'TDEA': 1}}, 'constructions': {'MAC': {'KMAC': 2, 'CMAC': 6, 'CBC-MAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 10}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 9, 'DH': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 7}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 166}}, 'randomness': {'RNG': {'RND': 4, 'RNG': 8}}, 'cipher_mode': {'CBC': {'CBC': 5}}, 'ecc_curve': {'NIST': {'P-256': 2, 'NIST P-256': 2, 'secp256r1': 1}, 'Brainpool': {'brainpoolP192r1': 1, 'brainpoolP224r1': 1, 'brainpoolP256r1': 1, 'brainpoolP320r1': 1, 'brainpoolP384r1': 1, 'brainpoolP512r1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 5, 'physical probing': 3, 'Physical Probing': 2, 'DPA': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 2, 'Physical tampering': 1, 'Malfunction': 7, 'malfunction': 4, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 8, 'EF.DG2': 5, 'EF.DG3': 9, 'EF.DG4': 8, 'EF.DG5': 3, 'EF.DG16': 6, 'EF.DG14': 4, 'EF.DG13': 1, 'EF.COM': 3, 'EF.SOD': 5}}, 'standard_id': {'FIPS': {'FIPS186': 8, 'FIPS180': 2, 'FIPS 197': 1, 'FIPS 186': 2, 'FIPS197': 3, 'FIPS 180': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-4': 1}, 'PKCS': {'PKCS#3': 3}, 'BSI': {'AIS36': 4, 'AIS31': 5, 'AIS 31': 1, 'AIS 36': 1}, 'RFC': {'RFC5639': 8, 'RFC 2631': 1, 'RFC3369': 1, 'RFC 5639': 5}, 'ISO': {'ISO/IEC 14443': 4, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 13}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 0808V2b_pdf.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0808V2b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}}, 'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}]} values added.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0978-2016']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0666-2012']}}} data.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0808V2a_pdf.pdf, code: 408'].

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0809-V3-2017']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0666-2012']}}} data.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to fa0e48d4bf014613527604772bc01b9931c618bb508874b82cb6a3c4f2c79bb8.
    • The st_txt_hash property was set to 47d48e6d5b4b3071b1138d705e6f22130d5f13ded570fc4b28fe144211a0e07c.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 756103, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 94, '/Author': 'T-Systems International GmbH', '/Company': 'T-Systems International GmbH', '/CreationDate': "D:20160810091133+02'00'", '/Creator': 'Acrobat PDFMaker 10.1 fĂĽr Word', '/Keywords': 'TCOS Passport, Electronic Passport, ePass, MRTD, PACE, EAC', '/ModDate': "D:20160810091147+02'00'", '/Producer': 'Adobe PDF Library 10.0', '/SourceModified': 'D:20160810070830', '/Subject': 'TCOS Passport Version 2.1 Release 2', '/Title': 'Security Target TCOS Passport 2.1 Release 2 (NXP)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz', 'http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip']}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0808-V2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP- 0056-V2-2012': 2, 'BSI-CC-PP-0068-V2-2011': 2, 'BSI-CC-PP-0055': 1, 'BSI-PP-0026': 1, 'BSI-CC-PP- 0068-V2-2011': 1, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL4': 11, 'EAL 6+': 1, 'EAL 4': 1, 'EAL 6': 1, 'EAL4 augmented': 2, 'EAL 4 augmented': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_TDS.3': 3, 'ADV_FUN.1': 1, 'ADV_FSP.4': 2, 'ADV_IMP.1': 4, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 7, 'ALC_FLR.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 5, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN.5': 8}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 6, 'FAU_SAS.1': 11, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 6, 'FCS_RND.1': 11, 'FCS_RND.1.1': 2, 'FCS_COP': 40, 'FCS_CKM': 38, 'FCS_CKM.1': 6, 'FCS_CKM.2': 4, 'FCS_COP.1': 12, 'FCS_CKM.4': 17, 'FCS_CKM.4.1': 1, 'FCS_RNG.1': 3}, 'FDP': {'FDP_ACF': 9, 'FDP_UCT': 6, 'FDP_UIT': 6, 'FDP_RIP': 3, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_RIP.1': 7, 'FDP_ACC': 8, 'FDP_ACF.1': 13, 'FDP_ACC.1': 5, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 3, 'FDP_UCT.1': 2, 'FDP_UIT.1': 3, 'FDP_ITT.1': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_API': 7, 'FIA_API.1': 10, 'FIA_API.1.1': 2, 'FIA_UAU': 54, 'FIA_UID': 11, 'FIA_AFL': 8, 'FIA_UAU.4': 2, 'FIA_UAU.5': 3, 'FIA_UAU.1': 3, 'FIA_AFL.1': 3, 'FIA_UID.1': 5, 'FIA_UAU.6': 2}, 'FMT': {'FMT_LIM': 5, 'FMT_LIM.1': 20, 'FMT_LIM.2': 18, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_SMR': 9, 'FMT_MTD': 58, 'FMT_MTD.3': 8, 'FMT_MSA.3': 3, 'FMT_MSA.1': 2, 'FMT_SMF.1': 24, 'FMT_SMR.1': 13, 'FMT_SMF.1.1': 1, 'FMT_MTD.1': 5, 'FMT_MTD.3.1': 1, 'FMT_MDT.3': 1}, 'FPT': {'FPT_EMS': 6, 'FPT_EMS.1': 12, 'FPT_EMS.1.1': 5, 'FPT_EMS.1.2': 3, 'FPT_FLS.1': 10, 'FPT_TST.1': 6, 'FPT_PHP.3': 9, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3.1': 1, 'FPT_FLS': 1, 'FPT_TST': 1, 'FPT_PHP': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 10, 'FTP_ITC.1': 6, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RND': 2, 'O.HW_AES': 4, 'O.CUST_RECONFIG': 1, 'O.MEM_ACCESS': 2, 'O.SFR_ACCESS': 2, 'O.FW_HW': 1}, 'T': {'T.RND': 2}}, 'vendor': {'NXP': {'NXP': 5, 'NXP Semiconductors': 1}}, 'eval_facility': {'TSystems': {'T-Systems International': 100}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 17}}, 'DES': {'DES': {'DES': 7}, '3DES': {'TDES': 14, '3DES': 5, 'Triple-DES': 2, 'TDEA': 1}}, 'constructions': {'MAC': {'KMAC': 2, 'CMAC': 6, 'CBC-MAC': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 10}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 9, 'DH': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 7}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 166}}, 'randomness': {'RNG': {'RND': 4, 'RNG': 8}}, 'cipher_mode': {'CBC': {'CBC': 5}}, 'ecc_curve': {'NIST': {'P-256': 2, 'NIST P-256': 2, 'secp256r1': 1}, 'Brainpool': {'brainpoolP192r1': 1, 'brainpoolP224r1': 1, 'brainpoolP256r1': 1, 'brainpoolP320r1': 1, 'brainpoolP384r1': 1, 'brainpoolP512r1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 5, 'physical probing': 3, 'Physical Probing': 2, 'DPA': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 2, 'Physical tampering': 1, 'Malfunction': 7, 'malfunction': 4, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 8, 'EF.DG2': 5, 'EF.DG3': 9, 'EF.DG4': 8, 'EF.DG5': 3, 'EF.DG16': 6, 'EF.DG14': 4, 'EF.DG13': 1, 'EF.COM': 3, 'EF.SOD': 5}}, 'standard_id': {'FIPS': {'FIPS186': 8, 'FIPS180': 2, 'FIPS 197': 1, 'FIPS 186': 2, 'FIPS197': 3, 'FIPS 180': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-4': 1}, 'PKCS': {'PKCS#3': 3}, 'BSI': {'AIS36': 4, 'AIS31': 5, 'AIS 31': 1, 'AIS 36': 1}, 'RFC': {'RFC5639': 8, 'RFC 2631': 1, 'RFC3369': 1, 'RFC 5639': 5}, 'ISO': {'ISO/IEC 14443': 4, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 13}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to 0808V2b_pdf.pdf.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0809-V3-2017']}}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}]} values added.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0808V2a_pdf.pdf, code: 408', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0808V2b_pdf.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}]} values added.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 21.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0808V2a_pdf.pdf, code: nok'].
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD-PP_V1.10', 'MRTD_ICAO_EAC_V1.3']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 28.09.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0808V2a_pdf.pdf', 'st_filename': '0808V2b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0808-2013': 6, 'BSI-DSZ-CC-0978-2016': 8, 'BSI-DSZ-CC-0808-V2-2016': 40}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 4': 13, 'EAL 2': 4, 'EAL 6': 4}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_DVS.2': 6}, '__delete__': ['ALC_LCD']}, 'AVA': {'__update__': {'AVA_VAN.5': 6}}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP': 8}}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 12}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'ETR) - TCOS Passport Version 2.1 Release 2/P60D144, SRC Security Research & Consulting GmbH (confidential document) 9 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie fĂĽr': 1, 'Release VA/VA(Y/B/X)/VE, BSI-DSZ-CC-0978, Version 2, 17.12.2015, TĂśV Informationstechnik GmbH (confidential document) [14] TR-03110, Advanced Security Mechanisms for Machine Readable Travel Documents – Extended': 1, 'Passport Version 2.1 Release 2/P60D144, Version 1.13, 10.08.2016, T-Systems International GmbH (confidential document) [18] Certification Report BSI-DSZ-CC-0809-V2-2016 for TCOS Passport Version 2.1 Release 2-BAC ': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL 6+': 1}, '__update__': {'EAL4 augmented': 2}}}}, 'cc_sar': {'__insert__': {'ASE': {'ASE_TSS.2': 1}}, '__update__': {'ADV': {'__insert__': {'ADV_FUN.1': 1}}, 'ATE': {'__insert__': {'ATE_DPT.1': 1}}, 'AVA': {'__update__': {'AVA_VAN.5': 8}}}, '__delete__': ['ACE']}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS': 6, 'FAU_SAS.1': 11}}, 'FCS': {'__insert__': {'FCS_COP': 40, 'FCS_CKM': 38}, '__update__': {'FCS_RND': 6, 'FCS_COP.1': 12, 'FCS_CKM.4': 17, 'FCS_CKM.1': 6, 'FCS_RNG.1': 3}}, 'FDP': {'__insert__': {'FDP_UCT': 6, 'FDP_UIT': 6, 'FDP_ACC': 8, 'FDP_ITT.1': 1, 'FDP_SDI.2': 1}, '__update__': {'FDP_ACF': 9, 'FDP_ACF.1': 13, 'FDP_ACC.1': 5, 'FDP_RIP.1': 7, 'FDP_RIP': 3, 'FDP_UCT.1': 2, 'FDP_UIT.1': 3}}, 'FIA': {'__insert__': {'FIA_UAU': 54, 'FIA_UID': 11, 'FIA_AFL': 8, 'FIA_UAU.4': 2, 'FIA_UAU.6': 2}, '__update__': {'FIA_API': 7, 'FIA_API.1': 10, 'FIA_UAU.5': 3, 'FIA_UAU.1': 3, 'FIA_UID.1': 5, 'FIA_AFL.1': 3}}, 'FMT': {'__insert__': {'FMT_SMR': 9, 'FMT_MTD': 58}, '__update__': {'FMT_LIM': 5, 'FMT_LIM.1': 20, 'FMT_LIM.2': 18, 'FMT_MTD.3': 8, 'FMT_SMF.1': 24, 'FMT_SMR.1': 13, 'FMT_MTD.1': 5}}, 'FPT': {'__insert__': {'FPT_FLS': 1, 'FPT_TST': 1, 'FPT_PHP': 1, 'FPT_ITT.1': 1}, '__update__': {'FPT_EMS': 6}}, 'FTP': {'__insert__': {'FTP_ITC': 10}, '__update__': {'FTP_ITC.1': 6}}}}, 'cc_claims': {'__delete__': ['D']}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 17}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 7}, '__delete__': ['DEA']}, '3DES': {'__update__': {'TDES': 14}}}}, 'constructions': {'__update__': {'MAC': {'__insert__': {'CBC-MAC': 1}, '__update__': {'KMAC': 2, 'CMAC': 6}}}}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'Diffie-Hellman': 9, 'DH': 3}}}, '__delete__': ['DSA']}}}, 'crypto_scheme': {'__update__': {'MAC': {'__update__': {'MAC': 7}}, 'KA': {'__delete__': ['KA']}}}, 'crypto_protocol': {'__update__': {'PACE': {'__update__': {'PACE': 166}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RND': 4, 'RNG': 8}}}, '__delete__': ['TRNG']}, 'cipher_mode': {'__delete__': ['CTR']}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'physical probing': 3}}, 'FI': {'__update__': {'Malfunction': 7}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ICAO': {'__update__': {'ICAO': 13}}}}} data.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}]} values added.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 756103, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 94, '/Author': 'T-Systems International GmbH', '/Company': 'T-Systems International GmbH', '/CreationDate': "D:20160810091133+02'00'", '/Creator': 'Acrobat PDFMaker 10.1 fĂĽr Word', '/Keywords': 'TCOS Passport, Electronic Passport, ePass, MRTD, PACE, EAC', '/ModDate': "D:20160810091147+02'00'", '/Producer': 'Adobe PDF Library 10.0', '/SourceModified': 'D:20160810070830', '/Subject': 'TCOS Passport Version 2.1 Release 2', '/Title': 'Security Target TCOS Passport 2.1 Release 2 (NXP)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz', 'http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip']}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD-PP_V1.10', 'MRTD_ICAO_EAC_V1.3']}}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ["Failed to read metadata of certs/targets/pdf/d317c9c2e53ce427.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'IndirectObject'", "Failed to read metadata of certs/targets/pdf/d317c9c2e53ce427.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'IndirectObject'"].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/AIS', 'https://www.bsi.bund.de/', 'https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/zertifizierung', 'http://www.sogisportal.eu/', 'http://www.commoncriteriaportal.org/']}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0808-2013': 4, 'BSI-DSZ-CC-0978-2016': 6, 'BSI-DSZ-CC-0808-V2-2016': 74, 'BSI-DSZ-CC-0809-V2-2016': 4}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0056-V2-2012-MA-02': 5, 'BSI-CC-PP-0068-V2-2011': 2}}, 'cc_security_level': {'EAL': {'EAL 4': 14, 'EAL 5': 9, 'EAL 1': 7, 'EAL 2': 5, 'EAL5': 1, 'EAL 5+': 1, 'EAL 6': 5, 'EAL 3': 4, 'EAL 7': 4, 'EAL 4 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.5': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.5': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 7, 'ALC_FLR': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 2, 'ALC_CMC.5': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 2, 'ALC_CMS.5': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_DPT.2': 6, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_COV.3': 1, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_FUN.2': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 7}}, 'eval_facility': {'TUV': {'TĂśV Informationstechnik': 1}, 'SRC': {'SRC Security Research & Consulting': 3}, 'TSystems': {'T-Systems International': 12}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 3}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'PACE': {'PACE': 15}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}, 'FI': {'fault injection': 1}, 'other': {'JIL': 3}}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 25': 3, 'AIS 26': 3, 'AIS 36': 5, 'AIS 20': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 38': 1, 'AIS36': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2}, 'ICAO': {'ICAO': 6}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'eport (ETR) - TCOS Passport Version 2.1 Release 2/P60D144, SRC Security Research & Consulting GmbH (confidential document) 9 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie fĂĽr': 1, '080y Release VA/VA(Y/B/X)/VE, BSI-DSZ-CC-0978, Version 2, 17.12.2015, TĂśV Informationstechnik GmbH (confidential document) [14] TR-03110, Advanced Security Mechanisms for Machine Readable Travel Documents – Extended': 1, 'COS Passport Version 2.1 Release 2/P60D144, Version 1.13, 10.08.2016, T-Systems International GmbH (confidential document) [18] Certification Report BSI-DSZ-CC-0809-V2-2016 for TCOS Passport Version 2.1 Release 2-BAC ': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0808-V2': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP- 0056-V2-2012': 2, 'BSI-CC-PP-0068-V2-2011': 2, 'BSI-CC-PP-0055': 1, 'BSI-PP-0026': 1, 'BSI-CC-PP- 0068-V2-2011': 1, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-CC-PP-0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL4': 11, 'EAL 4': 1, 'EAL 6': 1, 'EAL4 augmented': 1, 'EAL 4 augmented': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ACE': {'ACE_ENC': 3}, 'ADV': {'ADV_ARC.1': 4, 'ADV_TDS.3': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 4, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 7, 'ALC_FLR.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 5, 'ATE_DPT.3': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN.5': 6}}, 'cc_sfr': {'FAU': {'FAU_SAS': 4, 'FAU_SAS.1': 9, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 4, 'FCS_RND.1': 11, 'FCS_RND.1.1': 2, 'FCS_CKM.2': 4, 'FCS_COP.1': 3, 'FCS_CKM.4': 14, 'FCS_CKM.1': 4, 'FCS_CKM.4.1': 1, 'FCS_RNG.1': 1}, 'FDP': {'FDP_ACF': 1, 'FDP_ITC.1': 4, 'FDP_ITC.2': 4, 'FDP_ACF.1': 3, 'FDP_ACC.1': 4, 'FDP_RIP.1': 6, 'FDP_RIP.1.1': 1, 'FDP_RIP': 1, 'FDP_IFC.1': 3, 'FDP_UCT.1': 1, 'FDP_UIT.1': 1}, 'FIA': {'FIA_API': 4, 'FIA_API.1': 8, 'FIA_API.1.1': 2, 'FIA_UAU.5': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 2, 'FIA_AFL.1': 1}, 'FMT': {'FMT_LIM': 4, 'FMT_LIM.1': 19, 'FMT_LIM.2': 17, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 2, 'FMT_MTD.3': 7, 'FMT_MSA.3': 3, 'FMT_MSA.1': 2, 'FMT_SMF.1': 22, 'FMT_SMR.1': 14, 'FMT_SMF.1.1': 1, 'FMT_MTD.1': 1, 'FMT_MTD.3.1': 1, 'FMT_MDT.3': 1}, 'FPT': {'FPT_EMS': 4, 'FPT_EMS.1': 12, 'FPT_EMS.1.1': 5, 'FPT_EMS.1.2': 3, 'FPT_FLS.1': 10, 'FPT_TST.1': 6, 'FPT_PHP.3': 9, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 2, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.TCOS.ASE': 1}, 'O': {'O.RND': 2, 'O.HW_AES': 4, 'O.CUST_RECONFIG': 1, 'O.MEM_ACCESS': 2, 'O.SFR_ACCESS': 2, 'O.FW_HW': 1}, 'T': {'T.RND': 2}}, 'vendor': {'NXP': {'NXP': 5, 'NXP Semiconductors': 1}}, 'eval_facility': {'TSystems': {'T-Systems International': 100}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 24}}, 'DES': {'DES': {'DES': 33, 'DEA': 1}, '3DES': {'TDES': 16, '3DES': 5, 'Triple-DES': 2, 'TDEA': 1}}, 'constructions': {'MAC': {'KMAC': 12, 'CMAC': 7}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 10}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'Diffie-Hellman': 15, 'DH': 13}, 'DSA': {'DSA': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 44}, 'KA': {'Key Agreement': 1, 'KA': 1}}, 'crypto_protocol': {'PACE': {'PACE': 279}}, 'randomness': {'TRNG': {'TRNG': 5}, 'RNG': {'RND': 8, 'RNG': 12}}, 'cipher_mode': {'CBC': {'CBC': 5}, 'CTR': {'CTR': 108}}, 'ecc_curve': {'NIST': {'P-256': 2, 'NIST P-256': 2, 'secp256r1': 1}, 'Brainpool': {'brainpoolP192r1': 1, 'brainpoolP224r1': 1, 'brainpoolP256r1': 1, 'brainpoolP320r1': 1, 'brainpoolP384r1': 1, 'brainpoolP512r1': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 5, 'physical probing': 2, 'Physical Probing': 2, 'DPA': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 2, 'Physical tampering': 1, 'Malfunction': 14, 'malfunction': 4, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 8, 'EF.DG2': 5, 'EF.DG3': 9, 'EF.DG4': 8, 'EF.DG5': 3, 'EF.DG16': 6, 'EF.DG14': 4, 'EF.DG13': 1, 'EF.COM': 3, 'EF.SOD': 5}}, 'standard_id': {'FIPS': {'FIPS186': 8, 'FIPS180': 2, 'FIPS 197': 1, 'FIPS 186': 2, 'FIPS197': 3, 'FIPS 180': 1, 'FIPS PUB 180-4': 1, 'FIPS PUB 186-4': 1}, 'PKCS': {'PKCS#3': 3}, 'BSI': {'AIS36': 4, 'AIS31': 5, 'AIS 31': 1, 'AIS 36': 1}, 'RFC': {'RFC5639': 8, 'RFC 2631': 1, 'RFC3369': 1, 'RFC 5639': 5}, 'ISO': {'ISO/IEC 14443': 4, 'ISO/IEC 7816-4': 1}, 'ICAO': {'ICAO': 18}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '877914a59629425c8e94eb481022bca470f676d533f946ace49c5f901f3b8cd2', 'st_pdf_hash': 'fa0e48d4bf014613527604772bc01b9931c618bb508874b82cb6a3c4f2c79bb8', 'report_txt_hash': '0d3516d586eb068d784e092d1733369946336b351dc3618f18e8df895deb48a0', 'st_txt_hash': '47d48e6d5b4b3071b1138d705e6f22130d5f13ded570fc4b28fe144211a0e07c'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 1}, 'rules_asymmetric_crypto': {'ECC': 3}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'PACE': 15}, 'rules_randomness': {}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'side channel': 1, 'fault injection': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_ecc_curves': {'__insert__': {'NIST P-256': 2}}} data.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0808-V2']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0808-V2']}}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0808-V3-2017', 'BSI-DSZ-CC-0809-V2-2016']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0809-V3-2017', 'BSI-DSZ-CC-0809-V2-2016', 'BSI-DSZ-CC-0808-V3-2017', 'BSI-DSZ-CC-0808-V2-2016']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0809-V2-2016', 'BSI-DSZ-CC-0978-2016', 'BSI-DSZ-CC-0808-2013']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0808-V2-2016', 'BSI-DSZ-CC-0666-2012', 'BSI-DSZ-CC-0978-2016', 'BSI-DSZ-CC-0845-2012', 'BSI-DSZ-CC-0809-V2-2016', 'BSI-DSZ-CC-0809-2013', 'BSI-DSZ-CC-0885-2013', 'BSI-DSZ-CC-0886-2013', 'BSI-DSZ-CC-0808-2013']}}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['2.1']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0808-V3-2017', 'BSI-DSZ-CC-0809-V2-2016']}.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['MRTD-PP_V1.10', 'MRTD_ICAO_EAC_V1.3']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name TCOS Passport Version 2.1 Release 2/P60D144 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "d317c9c2e53ce427",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "cert_id": "BSI-DSZ-CC-0808-V2-2016",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0809-V2-2016",
          "BSI-DSZ-CC-0808-V3-2017"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0809-V2-2016",
          "BSI-DSZ-CC-0978-2016",
          "BSI-DSZ-CC-0808-2013"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0809-V2-2016",
          "BSI-DSZ-CC-0808-V3-2017",
          "BSI-DSZ-CC-0809-V3-2017",
          "BSI-DSZ-CC-0808-V2-2016"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0666-2012",
          "BSI-DSZ-CC-0845-2012",
          "BSI-DSZ-CC-0808-V2-2016",
          "BSI-DSZ-CC-0886-2013",
          "BSI-DSZ-CC-0808-2013",
          "BSI-DSZ-CC-0809-2013",
          "BSI-DSZ-CC-0978-2016",
          "BSI-DSZ-CC-0885-2013",
          "BSI-DSZ-CC-0809-V2-2016"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "T-Systems International GMBH",
  "manufacturer_web": "https://www.t-systems.de/",
  "name": "TCOS Passport Version 2.1 Release 2/P60D144",
  "not_valid_after": "2021-08-22",
  "not_valid_before": "2016-08-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "report_filename": "0808V2a_pdf.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5 SOGIS Recognition Agreement",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0808-V2-2016",
        "cert_item": "TCOS Passport Version 2.1 Release 2/P60D144",
        "cert_lab": "BSI",
        "developer": "T-Systems International GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Machine Readable Travel Document with \"ICAO Application\", Extended Access Control with PACE (EAC PP), Version 1.3.2, 5 December 2012, BSI-CC-PP-0056-V2-2012-MA-02 and in accordance with BSI Technische Richtlinie BSI-TR-03116-2, 2016"
      },
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0808-2013": 6,
          "BSI-DSZ-CC-0808-V2-2016": 40,
          "BSI-DSZ-CC-0809-V2-2016": 4,
          "BSI-DSZ-CC-0978-2016": 8
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012-MA-02": 5,
          "BSI-CC-PP-0068-V2-2011": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 1,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 2,
          "ALC_CMS.5": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 6,
          "ALC_FLR": 3,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 6,
          "ATE_DPT.3": 1,
          "ATE_DPT.4": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 1,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 2,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 7,
          "EAL 2": 4,
          "EAL 3": 4,
          "EAL 4": 13,
          "EAL 4 augmented": 3,
          "EAL 5": 9,
          "EAL 5+": 1,
          "EAL 6": 4,
          "EAL 7": 4,
          "EAL5": 1
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "ETR) - TCOS Passport Version 2.1 Release 2/P60D144, SRC Security Research \u0026 Consulting GmbH (confidential document) 9 specifically \u2022 AIS 20, Version 3, Funktionalit\u00e4tsklassen und Evaluationsmethodologie f\u00fcr": 1,
          "Passport Version 2.1 Release 2/P60D144, Version 1.13, 10.08.2016, T-Systems International GmbH (confidential document) [18] Certification Report BSI-DSZ-CC-0809-V2-2016 for TCOS Passport Version 2.1 Release 2-BAC ": 1,
          "Release VA/VA(Y/B/X)/VE, BSI-DSZ-CC-0978, Version 2, 17.12.2015, T\u00dcV Informationstechnik GmbH (confidential document) [14] TR-03110, Advanced Security Mechanisms for Machine Readable Travel Documents \u2013 Extended": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 12
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "SRC": {
          "SRC Security Research \u0026 Consulting": 3
        },
        "TSystems": {
          "T-Systems International": 12
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "fault injection": 1
        },
        "SCA": {
          "side channel": 1
        },
        "other": {
          "JIL": 3
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 25": 3,
          "AIS 26": 3,
          "AIS 31": 1,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 36": 5,
          "AIS 38": 1,
          "AIS36": 1
        },
        "ICAO": {
          "ICAO": 6
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 8
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20160901151510+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, MRTD, ePass, TCOS, PACE, ID Card, Identity Card T-Systems\"",
      "/ModDate": "D:20160901152526+02\u002700\u0027",
      "/Producer": "LibreOffice 4.2",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0808-V2-2016",
      "pdf_file_size_bytes": 1044945,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.sogisportal.eu/",
          "https://www.bsi.bund.de/zertifizierungsreporte"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 36
    },
    "st_filename": "0808V2b_pdf.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 10
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "DH": 3,
            "Diffie-Hellman": 9
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0808-V2": 3
        }
      },
      "cc_claims": {
        "O": {
          "O.CUST_RECONFIG": 1,
          "O.FW_HW": 1,
          "O.HW_AES": 4,
          "O.MEM_ACCESS": 2,
          "O.RND": 2,
          "O.SFR_ACCESS": 2
        },
        "T": {
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0056-V2-2012": 2,
          "BSI-CC-PP- 0068-V2-2011": 1,
          "BSI-CC-PP-0035-2007": 1,
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011": 2,
          "BSI-PP-0026": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 4,
          "ADV_FSP": 1,
          "ADV_FSP.4": 2,
          "ADV_FUN.1": 1,
          "ADV_IMP.1": 4,
          "ADV_TDS": 1,
          "ADV_TDS.3": 3
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 7,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 5,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.3": 1,
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL 6+": 1,
          "EAL4": 11,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS": 6,
          "FAU_SAS.1": 11,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 38,
          "FCS_CKM.1": 6,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 17,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 40,
          "FCS_COP.1": 12,
          "FCS_RND": 6,
          "FCS_RND.1": 11,
          "FCS_RND.1.1": 2,
          "FCS_RNG.1": 3
        },
        "FDP": {
          "FDP_ACC": 8,
          "FDP_ACC.1": 5,
          "FDP_ACF": 9,
          "FDP_ACF.1": 13,
          "FDP_IFC.1": 3,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 4,
          "FDP_ITT.1": 1,
          "FDP_RIP": 3,
          "FDP_RIP.1": 7,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.2": 1,
          "FDP_UCT": 6,
          "FDP_UCT.1": 2,
          "FDP_UIT": 6,
          "FDP_UIT.1": 3
        },
        "FIA": {
          "FIA_AFL": 8,
          "FIA_AFL.1": 3,
          "FIA_API": 7,
          "FIA_API.1": 10,
          "FIA_API.1.1": 2,
          "FIA_UAU": 54,
          "FIA_UAU.1": 3,
          "FIA_UAU.4": 2,
          "FIA_UAU.5": 3,
          "FIA_UAU.6": 2,
          "FIA_UID": 11,
          "FIA_UID.1": 5
        },
        "FMT": {
          "FMT_LIM": 5,
          "FMT_LIM.1": 20,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 18,
          "FMT_LIM.2.1": 2,
          "FMT_MDT.3": 1,
          "FMT_MSA.1": 2,
          "FMT_MSA.3": 3,
          "FMT_MTD": 58,
          "FMT_MTD.1": 5,
          "FMT_MTD.3": 8,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 24,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 9,
          "FMT_SMR.1": 13
        },
        "FPT": {
          "FPT_EMS": 6,
          "FPT_EMS.1": 12,
          "FPT_EMS.1.1": 5,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 1,
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 1,
          "FPT_PHP": 1,
          "FPT_PHP.3": 9,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 2
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 10,
          "FTP_ITC.1": 6,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 166
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP192r1": 1,
          "brainpoolP224r1": 1,
          "brainpoolP256r1": 1,
          "brainpoolP320r1": 1,
          "brainpoolP384r1": 1,
          "brainpoolP512r1": 1
        },
        "NIST": {
          "NIST P-256": 2,
          "P-256": 2,
          "secp256r1": 1
        }
      },
      "eval_facility": {
        "TSystems": {
          "T-Systems International": 100
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 3,
          "EF.DG1": 8,
          "EF.DG13": 1,
          "EF.DG14": 4,
          "EF.DG16": 6,
          "EF.DG2": 5,
          "EF.DG3": 9,
          "EF.DG4": 8,
          "EF.DG5": 3,
          "EF.SOD": 5
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 4,
          "RNG": 8
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 7,
          "Physical Tampering": 2,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 4,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 5,
          "Physical Probing": 2,
          "physical probing": 3
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1,
          "AIS 36": 1,
          "AIS31": 5,
          "AIS36": 4
        },
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-002": 2,
          "CCMB-2012-09-003": 2,
          "CCMB-2012-09-004": 2
        },
        "FIPS": {
          "FIPS 180": 1,
          "FIPS 186": 2,
          "FIPS 197": 1,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 1,
          "FIPS180": 2,
          "FIPS186": 8,
          "FIPS197": 3
        },
        "ICAO": {
          "ICAO": 13
        },
        "ISO": {
          "ISO/IEC 14443": 4,
          "ISO/IEC 7816-4": 1
        },
        "PKCS": {
          "PKCS#3": 3
        },
        "RFC": {
          "RFC 2631": 1,
          "RFC 5639": 5,
          "RFC3369": 1,
          "RFC5639": 8
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 17
          }
        },
        "DES": {
          "3DES": {
            "3DES": 5,
            "TDEA": 1,
            "TDES": 14,
            "Triple-DES": 2
          },
          "DES": {
            "DES": 7
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1,
            "CMAC": 6,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 5,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "T-Systems International GmbH",
      "/Company": "T-Systems International GmbH",
      "/CreationDate": "D:20160810091133+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 10.1 f\u00fcr Word",
      "/Keywords": "TCOS Passport, Electronic Passport, ePass, MRTD, PACE, EAC",
      "/ModDate": "D:20160810091147+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 10.0",
      "/SourceModified": "D:20160810070830",
      "/Subject": "TCOS Passport Version 2.1 Release 2",
      "/Title": "Security Target TCOS Passport 2.1 Release 2 (NXP)",
      "pdf_file_size_bytes": 756103,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://csrc.nist.gov/groups/ST/toolkit/rng/documents/sts-2.1.1.zip",
          "http://www.phy.duke.edu/~rgb/General/dieharder/dieharder-3.31.0.tgz"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 94
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "MRTD_ICAO_EAC_V1.3",
            "MRTD-PP_V1.10"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf",
        "pp_name": "Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0808V2a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.5",
      "ALC_DVS.2",
      "ATE_DPT.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0808V2b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "877914a59629425c8e94eb481022bca470f676d533f946ace49c5f901f3b8cd2",
    "report_txt_hash": "0d3516d586eb068d784e092d1733369946336b351dc3618f18e8df895deb48a0",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "fa0e48d4bf014613527604772bc01b9931c618bb508874b82cb6a3c4f2c79bb8",
    "st_txt_hash": "47d48e6d5b4b3071b1138d705e6f22130d5f13ded570fc4b28fe144211a0e07c"
  },
  "status": "archived"
}