AKIS GEZGIN_N v2.0 BAC Configuration and BAP Configuration 1 with Active Authentication

CSV information

Status active
Valid from 29.02.2024
Valid until 28.02.2029
Scheme 🇹🇷 TR
Manufacturer TÜBİTAK BİLGEM UEKAE
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, ALC_DVS.2

Heuristics summary

Certificate

Extracted keywords

Security Assurance Requirements (SAR)
ALC_DVS.2

Standards
ISO/IEC 15408

File metadata

Creation date D:20250605125406+03'00'
Pages 1
Creator Canon iR-ADV C5240 PDF
Producer Adobe PSL 1.2e for Canon

Certification report

Extracted keywords

Symmetric Algorithms
AES, DES
Asymmetric Algorithms
ECDSA, ECC
Schemes
MAC
Protocols
PACE
Engines
SmartMX3

IC data groups
EF.DG14, EF.DG15, EF.DG13
Vendor
NXP, NXP Semiconductors

Security level
EAL 4+, EAL2, EAL 4
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.2, ADV_COMP.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, AVA_VAN.3, AVA_COMP.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Protection profiles
BSI-CC-PP-0084-2014, BSI-PP-0056-V2-2012
Certificates
BSI-DSZ-CC-1136-V3-2022

Side-channel analysis
physical probing, malfunction

Standards
ISO/IEC 17025, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Creation date D:20240419163412+02'00'
Modification date D:20240503092238+03'00'
Pages 19
Creator Canon iR-ADV C5240 PDF
Producer Adobe PSL 1.2e for Canon

Security target

Extracted keywords

Symmetric Algorithms
AES, DES
Asymmetric Algorithms
ECDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Protocols
PACE
Randomness
RNG
Libraries
Crypto Library 0.7.6
Elliptic Curves
brainpoolP224r1, brainpoolP224t1, brainpoolP256r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1, ANSSI FRP256v1
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG16, EF.DG14, EF.DG15, EF.DG13, EF.DG2, EF.DG4, EF.DG11, EF.DG5, EF.DG6, EF.DG9, EF.DG3, EF.DG7, EF.DG8, EF.COM, EF.SOD
Vendor
NXP, NXP Semiconductors

Security level
EAL 4+, EAL 6, EAL 4, EAL 6 augmented, EAL 4 augmented
Claims
OE.BAC-
Security Assurance Requirements (SAR)
ADV_IMP.1, ADV_COMP.1, AGD_OPE.1, ALC_DVS.2, ALC_FLR.1, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_RND.1, FCS_CKM.1, FCS_CKM.4, FCS_COP, FCS_CKM.2, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_RND.1.1, FCS_RNG, FCS_CKM, FDP_ACF, FDP_ACC.1, FDP_ACF.1, FDP_ACC, FDP_UCT.1, FDP_UIT.1, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC, FDP_ITT.1, FDP_UCT, FDP_UIT, FDP_SDC.1, FDP_SDI.2, FIA_API, FIA_API.1, FIA_SOS.2, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_AFL.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_API.1.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MSA, FPT_FLS.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1, FTP_ITC
Protection profiles
BSI-CC-PP-0055, BSI-CC-PP- 0084-2014, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011
Certificates
BSI-DSZ-CC-1136-V3-2022
Evaluation facilities
TÜBİTAK BİLGEM

Side-channel analysis
physical probing, DPA, SPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, DFA, fault injection, reverse engineering
Certification process
out of scope, paper or the plastic card is achieved by physical and organizational security measures which are out of scope of this ST. UNCLASSIFIED TÜBİTAK BİLGEM UEKAE e-ID Technologies Security Target Lite AKIS GEZGIN_N, page 16 of 93 pages UNCLASSIFIED Note that for Active Authentication, the hash operation SHA-1 is out of scope for the signature generation with ECDSA and SHA-224 is only used for the signature generation with, target does not distinguish between the BIS, GIS and EIS because the Extended Access Control is out of scope. UNCLASSIFIED TÜBİTAK BİLGEM UEKAE e-ID Technologies Security Target Lite AKIS GEZGIN_N 2.0 BAC, the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. The hash operation SHA-1 for signature generation with ECDSA is out of scope

Standards
FIPS 46-3, FIPS 197, FIPS PUB 46-3, FIPS PUB 180-4, FIPS PUB 197, NIST SP 800-38A, ISO/IEC 9796-2, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Author Ali YILDIRIM
Creation date D:20240216145603+03'00'
Modification date D:20240216145603+03'00'
Pages 93
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics

No heuristics are available for this certificate.

Extracted SARs

ADV_ARC.1, ADV_COMP.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.2, AGD_OPE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COMP.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_COMP.1, AVA_VAN.5

References

No references are available for this certificate as its ID was not successfully extracted.

Updates

  • 23.06.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name AKIS GEZGIN_N v2.0 BAC Configuration and BAP Configuration 1 with Active Authentication was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_N%20v2.0%20BAC%20\u0026%20BAP1%20\u0026%20AA%20Certificate_Revised.pdf",
  "dgst": "0b2fcb4c27fd36e0",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": null,
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "T\u00dcB\u0130TAK B\u0130LGEM UEKAE",
  "manufacturer_web": "https://www.uekae.tubitak.gov.tr",
  "name": "AKIS GEZGIN_N v2.0 BAC Configuration and BAP Configuration 1 with Active Authentication",
  "not_valid_after": "2029-02-28",
  "not_valid_before": "2024-02-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "AKiS GEZGiN_N v2.0 BAC \u0026 BAP1 \u0026 AA Certificate_Revised.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20250605125406+03\u002700\u0027",
      "/Creator": "Canon iR-ADV C5240  PDF",
      "/Producer": "Adobe PSL 1.2e for Canon\u0000",
      "pdf_file_size_bytes": 79928,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "AKiS GEZGiN_N v2.0 BAC \u0026 BAP1 \u0026 AA CR_Signed.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V3-2022": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 2,
          "BSI-PP-0056-V2-2012": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_COMP.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_INT.2": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 6,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COMP.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_COMP.1": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4+": 5,
          "EAL2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX3": 1
        }
      },
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 3
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {
        "EF": {
          "EF.DG13": 1,
          "EF.DG14": 1,
          "EF.DG15": 1
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {
        "org": {
          "org.tr": 1
        }
      },
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        },
        "SCA": {
          "physical probing": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "ICAO": {
          "ICAO": 4
        },
        "ISO": {
          "ISO/IEC 17025": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 10,
          "NXP Semiconductors": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240419163412+02\u002700\u0027",
      "/Creator": "Canon iR-ADV C5240  PDF",
      "/ModDate": "D:20240503092238+03\u002700\u0027",
      "/Producer": "Adobe PSL 1.2e for Canon",
      "pdf_file_size_bytes": 1315189,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 19
    },
    "st_filename": "AKiS GEZGiN_N BAC \u0026 BAP1 \u0026 AA Security Target Lite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDSA": {
            "ECDSA": 6
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V3-2022": 1
        }
      },
      "cc_claims": {
        "OE": {
          "OE.BAC-": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0084-2014": 2,
          "BSI-CC-PP-0055": 6,
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_COMP.1": 5,
          "ADV_IMP.1": 7
        },
        "AGD": {
          "AGD_OPE.1": 5
        },
        "ALC": {
          "ALC_DVS.2": 8,
          "ALC_FLR.1": 2
        },
        "ASE": {
          "ASE_TSS.2": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 9,
          "EAL 4 augmented": 3,
          "EAL 4+": 1,
          "EAL 6": 3,
          "EAL 6 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 4,
          "FAU_SAS.1": 14,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 11,
          "FCS_CKM.1": 28,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 25,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 62,
          "FCS_COP.1": 7,
          "FCS_RND": 5,
          "FCS_RND.1": 15,
          "FCS_RND.1.1": 1,
          "FCS_RNG": 3
        },
        "FDP": {
          "FDP_ACC": 26,
          "FDP_ACC.1": 11,
          "FDP_ACF": 23,
          "FDP_ACF.1": 19,
          "FDP_IFC.1": 5,
          "FDP_ITC": 1,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 12,
          "FDP_ITT.1": 1,
          "FDP_SDC.1": 1,
          "FDP_SDI.2": 1,
          "FDP_UCT": 1,
          "FDP_UCT.1": 10,
          "FDP_UCT.1.1": 1,
          "FDP_UIT": 1,
          "FDP_UIT.1": 10,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 8,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 4,
          "FIA_API.1": 13,
          "FIA_API.1.1": 1,
          "FIA_SOS.2": 1,
          "FIA_UAU.1": 11,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 9,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 10,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 9,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 6,
          "FMT_LIM.1": 22,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 21,
          "FMT_LIM.2.1": 2,
          "FMT_MSA": 2,
          "FMT_MSA.3": 6,
          "FMT_MTD": 35,
          "FMT_MTD.1": 4,
          "FMT_SMF.1": 22,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 16,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 14,
          "FPT_PHP.3.1": 1,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 5,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 5,
          "page 16 of 93 pages UNCLASSIFIED Note that for Active Authentication, the hash operation SHA-1 is out of scope for the signature generation with ECDSA and SHA-224 is only used for the signature generation with": 1,
          "paper or the plastic card is achieved by physical and organizational security measures which are out of scope of this ST. UNCLASSIFIED T\u00dcB\u0130TAK B\u0130LGEM UEKAE e-ID Technologies Security Target Lite AKIS GEZGIN_N": 1,
          "target does not distinguish between the BIS, GIS and EIS because the Extended Access Control is out of scope. UNCLASSIFIED T\u00dcB\u0130TAK B\u0130LGEM UEKAE e-ID Technologies Security Target Lite AKIS GEZGIN_N 2.0 BAC": 1,
          "the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. The hash operation SHA-1 for signature generation with ECDSA is out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library 0.7.6": 1
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 4
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {
        "ANSSI": {
          "ANSSI FRP256v1": 1
        },
        "Brainpool": {
          "brainpoolP224r1": 1,
          "brainpoolP224t1": 1,
          "brainpoolP256r1": 1,
          "brainpoolP256t1": 1,
          "brainpoolP320r1": 1,
          "brainpoolP320t1": 1,
          "brainpoolP384r1": 1,
          "brainpoolP384t1": 1,
          "brainpoolP512r1": 1,
          "brainpoolP512t1": 1
        }
      },
      "eval_facility": {
        "TUBITAK-BILGEM": {
          "T\u00dcB\u0130TAK B\u0130LGEM": 93
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 8
          },
          "SHA2": {
            "SHA-224": 4,
            "SHA-256": 4,
            "SHA-384": 3,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 20,
          "EF.DG1": 47,
          "EF.DG11": 2,
          "EF.DG13": 6,
          "EF.DG14": 26,
          "EF.DG15": 4,
          "EF.DG16": 24,
          "EF.DG2": 5,
          "EF.DG3": 4,
          "EF.DG4": 4,
          "EF.DG5": 3,
          "EF.DG6": 3,
          "EF.DG7": 3,
          "EF.DG8": 3,
          "EF.DG9": 3,
          "EF.SOD": 19
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 7
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Malfunction": 4,
          "Physical Tampering": 5,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 5,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 2
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 197": 1,
          "FIPS 46-3": 1,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 1
        },
        "ICAO": {
          "ICAO": 11
        },
        "ISO": {
          "ISO/IEC 9796-2": 1
        },
        "NIST": {
          "NIST SP 800-38A": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "DES": {
            "DES": 7
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 6,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Ali YILDIRIM",
      "/CreationDate": "D:20240216145603+03\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20240216145603+03\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "pdf_file_size_bytes": 1700130,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 93
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_N%20v2.0%20BAC%20\u0026%20BAP1%20\u0026%20AA%20CR_Signed.pdf",
  "scheme": "TR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_N%20BAC%20\u0026%20BAP1%20\u0026%20AA%20Security%20Target%20Lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "76e35049a772cf92a5b532a5515ab6e4ff797b015aa64661ce5a8f334ea17ce6",
      "txt_hash": "7478066d4bedcbc93668ec1dcd78bba35ac566dd7fab7c694f3e42f96c80c202"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "fc434c27bcd84e45b07208adab449b90892b93a27dc32781ba8d19129d4897b4",
      "txt_hash": "f88c0ba6d9fd897259ff24b7c04a608e4c8dad606413a36c572c5732f2a232fe"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "134c90aa041e3caad5b6150d489371d2bc535e8888b3354dbe9d927b05d3ab2d",
      "txt_hash": "edbaedeff01a2745c8d4c70f13a095e4e9f1210d54da756e4c6b300587d48737"
    }
  },
  "status": "active"
}