This page was not yet optimized for use on mobile
devices.
AKIS GEZGIN_N v2.0 BAC Configuration and BAP Configuration 1 with Active Authentication
CSV information
| Status | active |
|---|---|
| Valid from | 29.02.2024 |
| Valid until | 28.02.2029 |
| Scheme | 🇹🇷 TR |
| Manufacturer | TÜBİTAK BİLGEM UEKAE |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4+, ALC_DVS.2 |
Heuristics summary
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security Assurance Requirements (SAR)
ALC_DVS.2Standards
ISO/IEC 15408Certification report
Extracted keywords
Symmetric Algorithms
AES, DESAsymmetric Algorithms
ECDSA, ECCSchemes
MACProtocols
PACEEngines
SmartMX3IC data groups
EF.DG14, EF.DG15, EF.DG13Vendor
NXP, NXP SemiconductorsSecurity level
EAL 4+, EAL2, EAL 4Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.2, ADV_COMP.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, AVA_VAN.3, AVA_COMP.1, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Protection profiles
BSI-CC-PP-0084-2014, BSI-PP-0056-V2-2012Certificates
BSI-DSZ-CC-1136-V3-2022Side-channel analysis
physical probing, malfunctionStandards
ISO/IEC 17025, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Creation date | D:20240419163412+02'00' |
|---|---|
| Modification date | D:20240503092238+03'00' |
| Pages | 19 |
| Creator | Canon iR-ADV C5240 PDF |
| Producer | Adobe PSL 1.2e for Canon |
Security target
Extracted keywords
Symmetric Algorithms
AES, DESAsymmetric Algorithms
ECDSA, ECCHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512Schemes
MACProtocols
PACERandomness
RNGLibraries
Crypto Library 0.7.6Elliptic Curves
brainpoolP224r1, brainpoolP224t1, brainpoolP256r1, brainpoolP256t1, brainpoolP320r1, brainpoolP320t1, brainpoolP384r1, brainpoolP384t1, brainpoolP512r1, brainpoolP512t1, ANSSI FRP256v1Block cipher modes
CBCIC data groups
EF.DG1, EF.DG16, EF.DG14, EF.DG15, EF.DG13, EF.DG2, EF.DG4, EF.DG11, EF.DG5, EF.DG6, EF.DG9, EF.DG3, EF.DG7, EF.DG8, EF.COM, EF.SODVendor
NXP, NXP SemiconductorsSecurity level
EAL 4+, EAL 6, EAL 4, EAL 6 augmented, EAL 4 augmentedClaims
OE.BAC-Security Assurance Requirements (SAR)
ADV_IMP.1, ADV_COMP.1, AGD_OPE.1, ALC_DVS.2, ALC_FLR.1, ASE_TSS.2Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_RND.1, FCS_CKM.1, FCS_CKM.4, FCS_COP, FCS_CKM.2, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_RND.1.1, FCS_RNG, FCS_CKM, FDP_ACF, FDP_ACC.1, FDP_ACF.1, FDP_ACC, FDP_UCT.1, FDP_UIT.1, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC, FDP_ITT.1, FDP_UCT, FDP_UIT, FDP_SDC.1, FDP_SDI.2, FIA_API, FIA_API.1, FIA_SOS.2, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_AFL.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_API.1.1, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MSA, FPT_FLS.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1, FTP_ITCProtection profiles
BSI-CC-PP-0055, BSI-CC-PP- 0084-2014, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011Certificates
BSI-DSZ-CC-1136-V3-2022Evaluation facilities
TÜBİTAK BİLGEMSide-channel analysis
physical probing, DPA, SPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, DFA, fault injection, reverse engineeringCertification process
out of scope, paper or the plastic card is achieved by physical and organizational security measures which are out of scope of this ST. UNCLASSIFIED TÜBİTAK BİLGEM UEKAE e-ID Technologies Security Target Lite AKIS GEZGIN_N, page 16 of 93 pages UNCLASSIFIED Note that for Active Authentication, the hash operation SHA-1 is out of scope for the signature generation with ECDSA and SHA-224 is only used for the signature generation with, target does not distinguish between the BIS, GIS and EIS because the Extended Access Control is out of scope. UNCLASSIFIED TÜBİTAK BİLGEM UEKAE e-ID Technologies Security Target Lite AKIS GEZGIN_N 2.0 BAC, the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. The hash operation SHA-1 for signature generation with ECDSA is out of scopeStandards
FIPS 46-3, FIPS 197, FIPS PUB 46-3, FIPS PUB 180-4, FIPS PUB 197, NIST SP 800-38A, ISO/IEC 9796-2, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Author | Ali YILDIRIM |
|---|---|
| Creation date | D:20240216145603+03'00' |
| Modification date | D:20240216145603+03'00' |
| Pages | 93 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Heuristics
No heuristics are available for this certificate.
Extracted SARs
ADV_ARC.1, ADV_COMP.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.2, AGD_OPE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COMP.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_COMP.1, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| Akis Gezgin_N BAC Configuration with Active Authentication v1.0.1.0 | 21.0.03/TSE-CCCS-71 | Compare |
| AKIS GEZGIN_I v1.0.0.0 BAC Configuration with Active Authentication | 21.0.03/TSE-CCCS-49 | Compare |
References
No references are available for this certificate as its ID was not successfully extracted.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_N%20v2.0%20BAC%20\u0026%20BAP1%20\u0026%20AA%20Certificate_Revised.pdf",
"dgst": "0b2fcb4c27fd36e0",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": null,
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "T\u00dcB\u0130TAK B\u0130LGEM UEKAE",
"manufacturer_web": "https://www.uekae.tubitak.gov.tr",
"name": "AKIS GEZGIN_N v2.0 BAC Configuration and BAP Configuration 1 with Active Authentication",
"not_valid_after": "2029-02-28",
"not_valid_before": "2024-02-29",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "AKiS GEZGiN_N v2.0 BAC \u0026 BAP1 \u0026 AA Certificate_Revised.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
}
},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "AKiS GEZGiN_N v2.0 BAC \u0026 BAP1 \u0026 AA CR_Signed.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1136-V3-2022": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 2,
"BSI-PP-0056-V2-2012": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_COMP.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 6,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COMP.1": 1,
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_COMP.1": 1,
"AVA_VAN.3": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4+": 5,
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX3": 1
}
},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 3
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {
"EF": {
"EF.DG13": 1,
"EF.DG14": 1,
"EF.DG15": 1
}
},
"javacard_api_const": {},
"javacard_packages": {
"org": {
"org.tr": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
},
"SCA": {
"physical probing": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"ICAO": {
"ICAO": 4
},
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
},
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 10,
"NXP Semiconductors": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20240419163412+02\u002700\u0027",
"/Creator": "Canon iR-ADV C5240 PDF",
"/ModDate": "D:20240503092238+03\u002700\u0027",
"/Producer": "Adobe PSL 1.2e for Canon",
"pdf_file_size_bytes": 1315189,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 19
},
"st_filename": "AKiS GEZGiN_N BAC \u0026 BAP1 \u0026 AA Security Target Lite.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
},
"ECDSA": {
"ECDSA": 6
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1136-V3-2022": 1
}
},
"cc_claims": {
"OE": {
"OE.BAC-": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0084-2014": 2,
"BSI-CC-PP-0055": 6,
"BSI-CC-PP-0056-V2-2012": 1,
"BSI-CC-PP-0068-V2-2011": 1
}
},
"cc_sar": {
"ADV": {
"ADV_COMP.1": 5,
"ADV_IMP.1": 7
},
"AGD": {
"AGD_OPE.1": 5
},
"ALC": {
"ALC_DVS.2": 8,
"ALC_FLR.1": 2
},
"ASE": {
"ASE_TSS.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 9,
"EAL 4 augmented": 3,
"EAL 4+": 1,
"EAL 6": 3,
"EAL 6 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 4,
"FAU_SAS.1": 14,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 11,
"FCS_CKM.1": 28,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 25,
"FCS_CKM.4.1": 1,
"FCS_COP": 62,
"FCS_COP.1": 7,
"FCS_RND": 5,
"FCS_RND.1": 15,
"FCS_RND.1.1": 1,
"FCS_RNG": 3
},
"FDP": {
"FDP_ACC": 26,
"FDP_ACC.1": 11,
"FDP_ACF": 23,
"FDP_ACF.1": 19,
"FDP_IFC.1": 5,
"FDP_ITC": 1,
"FDP_ITC.1": 12,
"FDP_ITC.2": 12,
"FDP_ITT.1": 1,
"FDP_SDC.1": 1,
"FDP_SDI.2": 1,
"FDP_UCT": 1,
"FDP_UCT.1": 10,
"FDP_UCT.1.1": 1,
"FDP_UIT": 1,
"FDP_UIT.1": 10,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 4,
"FIA_API.1": 13,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU.1": 11,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 9,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 10,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU.6": 9,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 14,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 6,
"FMT_LIM.1": 22,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 21,
"FMT_LIM.2.1": 2,
"FMT_MSA": 2,
"FMT_MSA.3": 6,
"FMT_MTD": 35,
"FMT_MTD.1": 4,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 21,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 16,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.3": 14,
"FPT_PHP.3.1": 1,
"FPT_TST.1": 11,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 1,
"FTP_ITC.1": 5,
"FTP_TRP.1": 5
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 5,
"page 16 of 93 pages UNCLASSIFIED Note that for Active Authentication, the hash operation SHA-1 is out of scope for the signature generation with ECDSA and SHA-224 is only used for the signature generation with": 1,
"paper or the plastic card is achieved by physical and organizational security measures which are out of scope of this ST. UNCLASSIFIED T\u00dcB\u0130TAK B\u0130LGEM UEKAE e-ID Technologies Security Target Lite AKIS GEZGIN_N": 1,
"target does not distinguish between the BIS, GIS and EIS because the Extended Access Control is out of scope. UNCLASSIFIED T\u00dcB\u0130TAK B\u0130LGEM UEKAE e-ID Technologies Security Target Lite AKIS GEZGIN_N 2.0 BAC": 1,
"the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. The hash operation SHA-1 for signature generation with ECDSA is out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Generic": {
"Crypto Library 0.7.6": 1
}
},
"crypto_protocol": {
"PACE": {
"PACE": 4
}
},
"crypto_scheme": {
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {
"ANSSI": {
"ANSSI FRP256v1": 1
},
"Brainpool": {
"brainpoolP224r1": 1,
"brainpoolP224t1": 1,
"brainpoolP256r1": 1,
"brainpoolP256t1": 1,
"brainpoolP320r1": 1,
"brainpoolP320t1": 1,
"brainpoolP384r1": 1,
"brainpoolP384t1": 1,
"brainpoolP512r1": 1,
"brainpoolP512t1": 1
}
},
"eval_facility": {
"TUBITAK-BILGEM": {
"T\u00dcB\u0130TAK B\u0130LGEM": 93
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-224": 4,
"SHA-256": 4,
"SHA-384": 3,
"SHA-512": 3
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 20,
"EF.DG1": 47,
"EF.DG11": 2,
"EF.DG13": 6,
"EF.DG14": 26,
"EF.DG15": 4,
"EF.DG16": 24,
"EF.DG2": 5,
"EF.DG3": 4,
"EF.DG4": 4,
"EF.DG5": 3,
"EF.DG6": 3,
"EF.DG7": 3,
"EF.DG8": 3,
"EF.DG9": 3,
"EF.SOD": 19
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 7
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Malfunction": 4,
"Physical Tampering": 5,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 5,
"physical tampering": 2
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 2
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 2,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 197": 1,
"FIPS 46-3": 1,
"FIPS PUB 180-4": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1
},
"ICAO": {
"ICAO": 11
},
"ISO": {
"ISO/IEC 9796-2": 1
},
"NIST": {
"NIST SP 800-38A": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"DES": {
"DES": 7
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 6,
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Ali YILDIRIM",
"/CreationDate": "D:20240216145603+03\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20240216145603+03\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"pdf_file_size_bytes": 1700130,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 93
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_N%20v2.0%20BAC%20\u0026%20BAP1%20\u0026%20AA%20CR_Signed.pdf",
"scheme": "TR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_N%20BAC%20\u0026%20BAP1%20\u0026%20AA%20Security%20Target%20Lite.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "76e35049a772cf92a5b532a5515ab6e4ff797b015aa64661ce5a8f334ea17ce6",
"txt_hash": "7478066d4bedcbc93668ec1dcd78bba35ac566dd7fab7c694f3e42f96c80c202"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "fc434c27bcd84e45b07208adab449b90892b93a27dc32781ba8d19129d4897b4",
"txt_hash": "f88c0ba6d9fd897259ff24b7c04a608e4c8dad606413a36c572c5732f2a232fe"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "134c90aa041e3caad5b6150d489371d2bc535e8888b3354dbe9d927b05d3ab2d",
"txt_hash": "edbaedeff01a2745c8d4c70f13a095e4e9f1210d54da756e4c6b300587d48737"
}
},
"status": "active"
}