This page was not yet optimized for use on mobile
devices.
MaskTech eSign Applet on Secora ID S v1.1
CSV information
| Status | active |
|---|---|
| Valid from | 18.10.2022 |
| Valid until | 18.10.2027 |
| Scheme | 🇳🇱 NL |
| Manufacturer | MaskTech International GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
| Protection profiles |
|
Heuristics summary
Certificate ID: NSCIB-CC-0299278-CR
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL5, EAL2, EAL 7, EAL5 augmentedClaims
R.LSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.3, AVA_VAN.5Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-2013-MA-01Certificates
CC-22-0299278Evaluation facilities
SGS, SGS Brightsight, BrightsightStandards
ISO/IEC 15408-1, ISO/IEC 15408-2, ISO/IEC 15408-3, ISO/IEC 18045Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, TDESAsymmetric Algorithms
ECDH, ECDSA, Diffie-HellmanHash functions
SHA-1, SHA-2Schemes
Key agreementProtocols
PACERandomness
RNGVendor
Infineon, Infineon Technologies AGSecurity level
EAL4, EAL5, EAL5+, EAL 5, EAL6, EAL6+, EAL5 augmented, EAL 5 augmented, EAL6 augmentedSecurity Assurance Requirements (SAR)
ADV_IMP, ALC_DVS.2, ALC_FLR.1, AVA_VAN.5Protection profiles
BSI-CC-PP-0059-2009-, BSI-CC-PP-0075-2012-MA-01E, BSI-CC-PP-0071-2012-, BSI-CC-PP-0072-2012-, BSI-CC-PP-0076-2013-MA-01Certificates
BSI-DSZ-CC-1110-V5-2022, NSCIB-CC-0299278-CR, NSCIB-CC-21-175887-CR3Evaluation facilities
SGS, SGS Brightsight, Brightsight, TĂśV InformationstechnikSide-channel analysis
side channel, JIL, JIL-AAPS, JIL-AMCertification process
BSI-DSZ- CC- 1110-V5-2022, ETR for Composite evaluation (EFC), TÜV Informationstechnik GmbH (confidential document) [HW-ST] Public Security Target BSI-DSZ-CC-1110-V5-2022, Version 2.0, 2022-03-28, “Public SecurityStandards
AIS31, AIS 36, ICAO, SCP03File metadata
| Title | Certification Report |
|---|---|
| Author | Microsoft Office User |
| Creation date | D:20221020071005+01'00' |
| Modification date | D:20221020071005+01'00' |
| Pages | 12 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
Frontpage
| Certificate ID | NSCIB-CC-0299278-CR |
|---|---|
| Certified item | MaskTech eSign Applet on Secora™ ID S v1.1 |
| Certification lab | SGS Brightsight B.V. |
| Developer | MaskTech International GmbH |
References
Outgoing- BSI-DSZ-CC-1110-V5-2022 - active - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, 3DES, Triple-DES, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-2Schemes
MAC, Key agreementProtocols
PACERandomness
RNGBlock cipher modes
CBCIC data groups
EF.DG14, EF.SODTrusted Execution Environments
SSCVendor
Infineon Technologies AG, InfineonSecurity level
EAL5, EAL6, EAL5 augmented, EAL6 augmentedClaims
O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.COMMUNICATION, O.CARD-MANAGEMENT, O.SCP, A.CSP, A.CGA, A.SCA, OT.EMSEC_, OT.TOE_TC_, OE.HID_VAD, OE.CGA_TC_, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_FLR.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_CKM.1, FCS_CKM, FCS_COP, FCS_RND.1, FCS_COP.1, FCS_RND, FCS_CKM.2, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1.1, FCS_RND.1.1, FCS_RNG.1, FCS_CKM.3, FDP_ACC, FDP_AFC, FDP_UCT, FDP_ITC, FDP_DAU, FDP_UIT, FDP_ACF, FDP_RIP.1, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FDP_UCT.1, FDP_UIT.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FDP_DAU.1, FDP_DAU.2, FDP_RIP, FDP_IFC, FDP_IFF, FDP_ROL, FIA_API.1, FIA_UAU.1, FIA_UID.1, FIA_UAU, FIA_UAU.6, FIA_AFL, FIA_AFL.1, FIA_API, FIA_UAU.4, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_API.1.1, FIA_ATD, FIA_UID, FIA_USB, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.4, FMT_MSA, FMT_MTD, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MTD.1, FMT_SMR, FMT_SMF, FPR_UNO.1, FPT_EMS, FPT_EMS.1, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITC, FPT_TDC.1, FPT_RCV, FPT_FLS, FTP_ITC, FTP_ICT, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0059, BSI-CC-PP-0075, BSI-CC-PP- 0071, BSI-CC-PP- 0072, BSI-CC-PP-0076, BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0075-MA-01, BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0076-2013-MA-01, BSI-CC-PP-0084-2014, BSI-CC-PP-0086-2015Certificates
BSI-DSZ-CC-S-0183-2021, BSI-DSZ-CC-S-0189-2021, BSI-DSZ-CC-S-0207-2021, NSCIB-CC-299278, CC-22-175887, NSCIB-CC-299277, CC-299277Side-channel analysis
physical probing, side channel, physical tampering, malfunction, DFAStandards
FIPS 140-2, NIST SP 800-38A, PKCS #15, AIS 31, RFC 8017, ISO/IEC 15408-22, ISO/IEC 15408-32, ISO/IEC 15408-1, ISO/IEC 14443, ICAO, X.509, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004Technical reports
BSI TR-03110File metadata
| Title | Security Target – MaskTech eSign Applet on Secora™ ID S v1.1– Public version |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | Common Criteria, CC, Secure signature creation device, SSCD, EAL5 + |
| Author | MaskTech International GmbH |
| Creation date | D:20220923164508+02'00' |
| Modification date | D:20220923164508+02'00' |
| Pages | 116 |
| Creator | LaTeX with hyperref |
| Producer | pdfTeX-1.40.20 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
NSCIB-CC-0299278-CRExtracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-22-0299278-cert.pdf",
"dgst": "004dabd39b1e8b9c",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-0299278-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"27abdb9c6ab375a7",
"d918b28fd7bb5d79",
"1f7ea2e05de5b88b",
"4a814d0e3c9f9082",
"d9553e7194783182"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1110-V5-2022"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1110-V2-2019",
"BSI-DSZ-CC-0891-V2-2016",
"BSI-DSZ-CC-0945-2017",
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-1110-2019",
"BSI-DSZ-CC-0945-V2-2018",
"BSI-DSZ-CC-0945-V3-2018",
"BSI-DSZ-CC-1110-V5-2022",
"BSI-DSZ-CC-0891-2015",
"BSI-DSZ-CC-1110-V4-2021",
"BSI-DSZ-CC-1110-V3-2020"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "MaskTech International GmbH",
"manufacturer_web": "https://www.masktech.de/",
"name": "MaskTech eSign Applet on Secora ID S v1.1",
"not_valid_after": "2027-10-18",
"not_valid_before": "2022-10-18",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "nscib-cc-22-0299278-cert.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-22-0299278": 1
}
},
"cc_claims": {
"R": {
"R.L": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-02": 1,
"BSI-CC-PP-0071-2012-MA-01": 1,
"BSI-CC-PP-0072-2012-MA-01": 1,
"BSI-CC-PP-0075-2012-MA-": 1,
"BSI-CC-PP-0076-2013-MA-01": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR.3": 2
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 7": 1,
"EAL2": 1,
"EAL5": 1,
"EAL5 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
},
"SGS": {
"SGS": 1,
"SGS Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 1,
"ISO/IEC 15408-2": 1,
"ISO/IEC 15408-3": 1,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "nscib-cc-0299278-cr-1.0.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-0299278-CR",
"cert_item": "MaskTech eSign Applet on Secora\u2122 ID S v1.1",
"cert_lab": " SGS Brightsight B.V.",
"developer": "MaskTech International GmbH"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1110-V5-2022": 2
},
"NL": {
"NSCIB-CC-0299278-CR": 12,
"NSCIB-CC-21-175887-CR3": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-": 1,
"BSI-CC-PP-0071-2012-": 1,
"BSI-CC-PP-0072-2012-": 1,
"BSI-CC-PP-0075-2012-MA-01E": 1,
"BSI-CC-PP-0076-2013-MA-01": 1
}
},
"cc_sar": {
"ADV": {
"ADV_IMP": 1
},
"ALC": {
"ALC_DVS.2": 2,
"ALC_FLR.1": 1
},
"AVA": {
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL 5 augmented": 1,
"EAL4": 1,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL5+": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"BSI-DSZ- CC- 1110-V5-2022, ETR for Composite evaluation (EFC), T\u00dcV Informationstechnik GmbH (confidential document) [HW-ST] Public Security Target BSI-DSZ-CC-1110-V5-2022, Version 2.0, 2022-03-28, \u201cPublic Security": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 7
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
},
"SGS": {
"SGS": 2,
"SGS Brightsight": 2
},
"TUV": {
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"SCA": {
"side channel": 1
},
"other": {
"JIL": 2,
"JIL-AAPS": 1,
"JIL-AM": 1
}
},
"standard_id": {
"BSI": {
"AIS 36": 1,
"AIS31": 2
},
"ICAO": {
"ICAO": 1
},
"SCP": {
"SCP03": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"TDES": 2
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 1,
"Infineon Technologies AG": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Microsoft Office User",
"/CreationDate": "D:20221020071005+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20221020071005+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Title": "Certification Report",
"pdf_file_size_bytes": 624894,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"http://www.tuv.com/nl",
"mailto:[email protected]",
"https://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
},
"st_filename": "nscib-cc-0299278-stlite-1.2.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 5
},
"ECDH": {
"ECDH": 7
},
"ECDSA": {
"ECDSA": 6
}
},
"FF": {
"DH": {
"Diffie-Hellman": 3
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-S-0183-2021": 1,
"BSI-DSZ-CC-S-0189-2021": 1,
"BSI-DSZ-CC-S-0207-2021": 1
},
"NL": {
"CC-22-175887": 3,
"CC-299277": 1,
"NSCIB-CC-299277": 1,
"NSCIB-CC-299278": 1
}
},
"cc_claims": {
"A": {
"A.CGA": 3,
"A.CSP": 5,
"A.SCA": 3
},
"O": {
"O.ALARM": 1,
"O.CARD-MANAGEMENT": 1,
"O.CIPHER": 1,
"O.COMMUNICATION": 1,
"O.DELETION": 1,
"O.FIREWALL": 1,
"O.GLOBAL_ARRAYS_CONFID": 1,
"O.GLOBAL_ARRAYS_INTEG": 1,
"O.INSTALL": 1,
"O.KEY-MNGT": 1,
"O.LOAD": 1,
"O.NATIVE": 1,
"O.OBJ-DELETION": 1,
"O.OPERATE": 1,
"O.PIN-MNGT": 1,
"O.REALLOCATION": 1,
"O.RESOURCES": 1,
"O.SCP": 4,
"O.SID": 1,
"O.TRANSACTION": 1
},
"OE": {
"OE.APPLET": 2,
"OE.CGA_TC_": 1,
"OE.CODE-EVIDENCE": 2,
"OE.HID_VAD": 10,
"OE.VERIFICATION": 5
},
"OT": {
"OT.EMSEC_": 2,
"OT.TOE_TC_": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0071": 1,
"BSI-CC-PP- 0072": 1,
"BSI-CC-PP-0056-V2-2012-MA-02": 1,
"BSI-CC-PP-0059": 2,
"BSI-CC-PP-0059-2009-MA-02": 2,
"BSI-CC-PP-0068-V2-2011-MA-01": 1,
"BSI-CC-PP-0071-2012-MA-01": 2,
"BSI-CC-PP-0072-2012-MA-01": 2,
"BSI-CC-PP-0075": 1,
"BSI-CC-PP-0075-2012-MA-01": 1,
"BSI-CC-PP-0075-MA-01": 1,
"BSI-CC-PP-0076": 1,
"BSI-CC-PP-0076-2013-MA-01": 1,
"BSI-CC-PP-0084-2014": 1,
"BSI-CC-PP-0086-2015": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 4,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_IMP.1": 3,
"ADV_INT.2": 2,
"ADV_TDS.3": 1,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.4": 2,
"ALC_CMS.5": 2,
"ALC_DEL.1": 2,
"ALC_DVS.2": 10,
"ALC_FLR.1": 1,
"ALC_LCD.1": 2,
"ALC_TAT.2": 2
},
"ASE": {
"ASE_CCL.1": 3,
"ASE_ECD.1": 3,
"ASE_INT.1": 3,
"ASE_OBJ.2": 3,
"ASE_REQ.2": 3,
"ASE_SPD.1": 3,
"ASE_TSS.1": 3
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT.1": 1,
"ATE_DPT.3": 2,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN.5": 9
}
},
"cc_security_level": {
"EAL": {
"EAL5": 12,
"EAL5 augmented": 8,
"EAL6": 4,
"EAL6 augmented": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1
},
"FCO": {
"FCO_NRO": 1
},
"FCS": {
"FCS_CKM": 45,
"FCS_CKM.1": 22,
"FCS_CKM.2": 10,
"FCS_CKM.3": 1,
"FCS_CKM.4": 41,
"FCS_CKM.4.1": 1,
"FCS_COP": 59,
"FCS_COP.1": 28,
"FCS_COP.1.1": 1,
"FCS_RND": 1,
"FCS_RND.1": 9,
"FCS_RND.1.1": 1,
"FCS_RNG.1": 2
},
"FDP": {
"FDP_ACC": 65,
"FDP_ACC.1": 36,
"FDP_ACF": 27,
"FDP_ACF.1": 35,
"FDP_AFC": 13,
"FDP_DAU": 6,
"FDP_DAU.1": 1,
"FDP_DAU.2": 2,
"FDP_IFC": 2,
"FDP_IFC.1": 18,
"FDP_IFF": 2,
"FDP_ITC": 7,
"FDP_ITC.1": 17,
"FDP_ITC.2": 14,
"FDP_RIP": 9,
"FDP_RIP.1": 10,
"FDP_RIP.1.1": 1,
"FDP_ROL": 2,
"FDP_SDI": 11,
"FDP_SDI.1": 2,
"FDP_SDI.2": 5,
"FDP_UCT": 7,
"FDP_UCT.1": 1,
"FDP_UIT": 7,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 14,
"FIA_AFL.1": 7,
"FIA_API": 1,
"FIA_API.1": 8,
"FIA_API.1.1": 1,
"FIA_ATD": 1,
"FIA_UAU": 20,
"FIA_UAU.1": 18,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 2,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 2,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 10,
"FIA_UAU.6.1": 1,
"FIA_UID": 2,
"FIA_UID.1": 20,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 1,
"FIA_USB": 1
},
"FMT": {
"FMT_MOF.1": 5,
"FMT_MOF.1.1": 1,
"FMT_MSA": 64,
"FMT_MSA.1": 9,
"FMT_MSA.2": 5,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 20,
"FMT_MSA.3.1": 1,
"FMT_MSA.4": 4,
"FMT_MTD": 34,
"FMT_MTD.1": 5,
"FMT_SMF": 3,
"FMT_SMF.1": 34,
"FMT_SMF.1.1": 1,
"FMT_SMR": 3,
"FMT_SMR.1": 40,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 1
},
"FPT": {
"FPT_EMS": 9,
"FPT_EMS.1": 8,
"FPT_FLS": 4,
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_ITC": 1,
"FPT_PHP.1": 4,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 6,
"FPT_PHP.3.1": 1,
"FPT_RCV": 1,
"FPT_TDC.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 10,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ICT": 3,
"FTP_ITC": 25,
"FTP_ITC.1": 16,
"FTP_TRP.1": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 64
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 2
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-2": 3
}
}
},
"ic_data_group": {
"EF": {
"EF.DG14": 1,
"EF.SOD": 2
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"malfunction": 2,
"physical tampering": 5
},
"SCA": {
"physical probing": 2,
"side channel": 2
}
},
"standard_id": {
"BSI": {
"AIS 31": 2
},
"CC": {
"CCMB-2017-04-001": 2,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 2
},
"FIPS": {
"FIPS 140-2": 1
},
"ICAO": {
"ICAO": 5
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 15408-1": 2,
"ISO/IEC 15408-22": 1,
"ISO/IEC 15408-32": 1
},
"NIST": {
"NIST SP 800-38A": 1
},
"PKCS": {
"PKCS #15": 1
},
"RFC": {
"RFC 8017": 1
},
"SCP": {
"SCP03": 10
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 18
}
},
"DES": {
"3DES": {
"3DES": 5,
"TDES": 4,
"Triple-DES": 2
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"CMAC": 5
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 1
}
},
"tee_name": {
"IBM": {
"SSC": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 2,
"Infineon Technologies AG": 12
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "MaskTech International GmbH",
"/CreationDate": "D:20220923164508+02\u002700\u0027",
"/Creator": "LaTeX with hyperref",
"/Keywords": "Common Criteria, CC, Secure signature creation device, SSCD, EAL5 +",
"/ModDate": "D:20220923164508+02\u002700\u0027",
"/PTEX.Fullbanner": "This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019/Cygwin) kpathsea version 6.3.1",
"/Producer": "pdfTeX-1.40.20",
"/Subject": "Common Criteria Certification",
"/Title": "Security Target \u2013 MaskTech eSign Applet on Secora\u2122 ID S v1.1\u2013 Public version",
"/Trapped": "/False",
"pdf_file_size_bytes": 941228,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 116
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0299278-cr-1.0.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL5+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0299278-stlite-1.2.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "c6b82d6e26b7900d489203ef8c6687edc5534303a24d4bd9e3e6dfdde958ec37",
"txt_hash": "250eb9f898c199e2bfd1ba939f648f0f45add59eb1176fb5ee1eb8dacdab5414"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "2876710cfa5018b42a620e21858620116eaa1ad2690bf1587faf67f234d9f9c1",
"txt_hash": "9a2ef4cfe0c7c48f265e1f04b142ccf87606a65861851b04074649299832c2e4"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "cf3e10aa3c18c2cd878c7913c60c8e53bf6f2c3b9b974b7932d328abbee1b5e0",
"txt_hash": "e45f562034ad6e84ed44f2c10a34d8475e31ed1e077be440a76b3a28e6d47110"
}
},
"status": "active"
}