Luna PCI-E Cryptographic Module, Firmware version 6.10.9 (AVA_VAN.5)

CSV information ?

Status archived
Valid from 29.12.2017
Valid until 29.12.2022
Scheme 🇳🇱 NL
Manufacturer SafeNet Inc.
Category Products for Digital Signatures
Security level ALC_FLR.2, AVA_VAN.5, EAL4+

Heuristics summary ?

Certificate ID: NSCIB-CC-179205-CR

Certificate ?

Extracted keywords

Security level
EAL2, EAL7, EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.2, AVA_VAN.5
Certificates
CC-17-179205
Evaluation facilities
Brightsight

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title BHC364e-20171229160529
Creation date D:20171229160529+01'00'
Modification date D:20171229160529+01'00'
Pages 1
Creator BHC364e
Producer KONICA MINOLTA bizhub C364e

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, TDES
Asymmetric Algorithms
ECDSA

Security level
EAL4, EAL 4, EAL4+, EAL4 augmented, EAL 4 augmented
Claims
OE.ENV
Security Assurance Requirements (SAR)
ALC_FLR.2, AVA_VAN.4, AVA_VAN.5
Security Functional Requirements (SFR)
FPT_PHP.1, FPT_PHP.3, FPT_PHP
Certificates
NSCIB-CC-179205-CR, CC-17-38671, CC-38671
Evaluation facilities
Brightsight

Side-channel analysis
side channel
Certification process
out of scope, such as serial and USB interfaces on the device), are out of scope of these evaluations, interfaces not exposed to the host computer (such as serial and USB interfaces on the device), are out of scope of these evaluations. The user of the TOE is reminded to operate the TOE in a physically and

File metadata

Title Certification Report NSCIB-CC-179205-CR
Author p646
Creation date D:20171229163718+01'00'
Modification date D:20171229163718+01'00'
Pages 14
Creator PDFCreator Version 1.2.0
Producer GPL Ghostscript 9.0

Frontpage

Certificate ID NSCIB-CC-179205-CR
Certified item Luna PCI-E Cryptographic Module, Firmware Version 6.10.9
Certification lab Brightsight
Developer SafeNet Inc

References

Outgoing
  • NSCIB-CC-38671-CR - archived - Luna PCI-E Cryptographic Module, Firmware version 6.10.9

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-256, AES256, DES, TDES, TDEA, HMAC, CMAC
Asymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECIES, Diffie-Hellman, DH, DSA
Hash functions
SHA-1, SHA-256, SHA-224, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Randomness
DRBG, RNG
Elliptic Curves
P-192, P-224, P-256, P-384, P-521, K-163, K-233, K-283, K-409, B-163, B-233, B-283, B-409, B-571, K-571
Block cipher modes
ECB, CBC, GCM

Vendor
Gemalto

Security level
EAL4+, EAL 4, EAL4, EAL 4 augmented, EAL4 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM, FCS_CKM.2, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_ITC.2, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ETC.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_RIP.2, FDP_RIP.2.1, FDP_ITC.1, FDP_ACC.1, FDP_IFC.1, FDP_UCT.1, FDP_UIT.1, FDP_ACF.1.4, FIA_UAU.1, FIA_UID.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.6, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU.7.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_AFL, FIA_AFL.1, FIA_UID, FMT_SMR.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF, FMT_MTD, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_MOF.1, FMT_MTD.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FPT_EMS, FPT_TST.2, FPT_FLS.1, FPT_TST.2.6, FPT_EMS.1, FPT_PHP.1, FPT_PHP.3, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST, FPT_TST.1, FPT_TST.2.1, FPT_TST.2.2, FPT_TST.2.3, FPT_TST.2.4, FPT_TST.2.5, FPT_TST.2.7, FPT_TST.2.8, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_STM.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0078, BSI-CC-PP-00078, BSI-CC-PP-00080, BSI-PP-00078, BSI-PP-CC-00078

Side-channel analysis
physical probing, side-channels, Physical tampering, physical tampering, Malfunction, malfunction

Standards
FIPS PUB 186-3, FIPS PUB 197, FIPS PUB 180-4, FIPS PUB 198-1, FIPS PUB 113, NIST SP 800-67, SP 800-108, NIST SP 800-38B, NIST SP 800-38D, NIST SP 800-90A, NIST SP 800-90, SP 800-57, NIST SP 800-56A, NIST SP 800-57, SP 800-38D, SP 800-38B, PKCS #11, PKCS#11, PKCS #1, PKCS #8, AIS 20, AIS 31, AIS20, AIS31, ISO/IEC 15408-1, ISO/IEC 15408-2, ISO/IEC 15408-3, ISO/IEC 19790:2012
Technical reports
BSI TR-02101

File metadata

Creation date D:20171208160736+01'00'
Modification date D:20171208160736+01'00'
Pages 117
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Heuristics ?

Certificate ID: NSCIB-CC-179205-CR

Extracted SARs

ALC_LCD.1, ATE_DPT.1, ADV_TDS.3, ATE_COV.2, ATE_IND.2, ALC_FLR.2, ASE_SPD.1, AVA_VAN.5, ASE_TSS.1, ADV_ARC.1, ASE_ECD.1, ADV_FSP.4, ALC_CMS.4, ALC_DEL.1, ALC_CMC.4, ATE_FUN.1, ALC_DVS.1, AGD_OPE.1, ALC_TAT.1, ASE_REQ.2, AGD_PRE.1, ASE_OBJ.2, ASE_INT.1, ASE_CCL.1, ADV_IMP.1

Similar certificates

Name Certificate ID
Luna PCI-E Cryptographic Module, Firmware version 6.10.9 NSCIB-CC-38671-CR Compare

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2ac96e082ad25a2e7dfe2f058057c1c6dc83db3318ffce270b98be4aa3a75d9e', 'txt_hash': '491e4fd8a37861dff4b7e6cc8f346d8822cd6a8205bde1f385d2390e56840dcc'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd5b7ed6b7f6bb89bc5dbd7edbc61b84f7ace9a37e75e7af5f45fb7a714e8fffb', 'txt_hash': '12c67b2a5f54c15759520380a0a67bd41a68a260139b1be1dc1837313e063148'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9e80a8ec0910911b69a4ce72ceb05cdb076298074ddb7b288e50dd4bab12d6f6', 'txt_hash': '2e5d627f21d869355ee28a85ea728e68a1cdbc859220b5c36a221c18a80e1d76'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 575783, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Producer': 'GPL Ghostscript 9.0', '/CreationDate': "D:20171229163718+01'00'", '/ModDate': "D:20171229163718+01'00'", '/Title': 'Certification Report NSCIB-CC-179205-CR', '/Creator': 'PDFCreator Version 1.2.0', '/Author': 'p646', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1327623, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 117, '/Producer': 'Microsoft® Word 2010', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20171208160736+01'00'", '/ModDate': "D:20171208160736+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 194726, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'BHC364e-20171229160529', '/Creator': 'BHC364e', '/Producer': 'KONICA MINOLTA bizhub C364e', '/CreationDate': "D:20171229160529+01'00'", '/ModDate': "D:20171229160529+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'NL': {'cert_id': 'NSCIB-CC-179205-CR', 'cert_item': 'Luna PCI-E Cryptographic Module, Firmware Version 6.10.9', 'developer': 'SafeNet Inc', 'cert_lab': ' Brightsight'}}.
    • The report_keywords property was set to {'cc_cert_id': {'NL': {'NSCIB-CC-179205-CR': 13, 'CC-17-38671': 2, 'CC-38671': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 3, 'EAL 4': 1, 'EAL4+': 1, 'EAL4 augmented': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 2}, 'AVA': {'AVA_VAN.4': 2, 'AVA_VAN.5': 6}}, 'cc_sfr': {'FPT': {'FPT_PHP.1': 1, 'FPT_PHP.3': 1, 'FPT_PHP': 1}}, 'cc_claims': {'OE': {'OE.ENV': 2}}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'3DES': {'TDES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 2}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'such as serial and USB interfaces on the device), are out of scope of these evaluations': 2, 'interfaces not exposed to the host computer (such as serial and USB interfaces on the device), are out of scope of these evaluations. The user of the TOE is reminded to operate the TOE in a physically and': 2}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0078': 6, 'BSI-CC-PP-00078': 1, 'BSI-CC-PP-00080': 1, 'BSI-PP-00078': 1, 'BSI-PP-CC-00078': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL 4': 6, 'EAL4': 3, 'EAL 4 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.4': 5, 'ADV_IMP.1': 3, 'ADV_TDS.3': 4}, 'AGD': {'AGD_OPE.1': 3, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 19, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 11, 'AVA_VAN.3': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FCS': {'FCS_RNG': 3, 'FCS_RNG.1': 12, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 18, 'FCS_CKM.1.1': 1, 'FCS_CKM': 72, 'FCS_CKM.2': 17, 'FCS_CKM.4': 15, 'FCS_CKM.4.1': 1, 'FCS_COP': 37, 'FCS_COP.1': 10}, 'FDP': {'FDP_ACC': 31, 'FDP_ACC.2': 8, 'FDP_ACF': 33, 'FDP_ACF.1': 22, 'FDP_ITC.2': 17, 'FDP_ITC.2.1': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 2, 'FDP_ETC.2': 8, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 2, 'FDP_RIP.2': 6, 'FDP_RIP.2.1': 1, 'FDP_ITC.1': 4, 'FDP_ACC.1': 11, 'FDP_IFC.1': 4, 'FDP_UCT.1': 1, 'FDP_UIT.1': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_UAU.1': 9, 'FIA_UID.1': 10, 'FIA_ATD.1': 8, 'FIA_ATD.1.1': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.6': 5, 'FIA_UAU.6.1': 1, 'FIA_UAU.7': 5, 'FIA_UAU.7.1': 1, 'FIA_USB.1': 5, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_AFL': 15, 'FIA_AFL.1': 7, 'FIA_UID': 1}, 'FMT': {'FMT_SMR.2': 12, 'FMT_SMF.1': 13, 'FMT_SMF.1.1': 1, 'FMT_MOF': 14, 'FMT_MTD': 12, 'FMT_MSA': 26, 'FMT_MSA.2': 12, 'FMT_MSA.3': 15, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_MOF.1': 4, 'FMT_MTD.1': 3, 'FMT_MSA.1': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 10}, 'FPT': {'FPT_EMS': 3, 'FPT_TST.2': 16, 'FPT_FLS.1': 11, 'FPT_TST.2.6': 3, 'FPT_EMS.1': 11, 'FPT_PHP.1': 14, 'FPT_PHP.3': 11, 'FPT_EMS.1.1': 2, 'FPT_EMS.1.2': 2, 'FPT_TST': 1, 'FPT_TST.1': 8, 'FPT_TST.2.1': 3, 'FPT_TST.2.2': 2, 'FPT_TST.2.3': 2, 'FPT_TST.2.4': 2, 'FPT_TST.2.5': 2, 'FPT_TST.2.7': 2, 'FPT_TST.2.8': 2, 'FPT_TDC.1': 15, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_FLS.1.1': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_STM.1': 1}, 'FTP': {'FTP_ITC': 11, 'FTP_ITC.1': 4, 'FTP_TRP.1': 1}}, 'cc_claims': {}, 'vendor': {'Gemalto': {'Gemalto': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 36, 'AES-256': 4, 'AES256': 2}}, 'DES': {'DES': {'DES': 4}, '3DES': {'TDES': 27, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 9, 'CMAC': 8}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 4}, 'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 8}, 'ECIES': {'ECIES': 1}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 1}, 'DSA': {'DSA': 9}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 16}, 'SHA2': {'SHA-256': 16, 'SHA-224': 10, 'SHA-384': 14, 'SHA-512': 9}}}, 'crypto_scheme': {'MAC': {'MAC': 16}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'PRNG': {'DRBG': 3}, 'RNG': {'RNG': 8}}, 'cipher_mode': {'ECB': {'ECB': 8}, 'CBC': {'CBC': 15}, 'GCM': {'GCM': 3}}, 'ecc_curve': {'NIST': {'P-192': 12, 'P-224': 10, 'P-256': 12, 'P-384': 10, 'P-521': 12, 'K-163': 5, 'K-233': 5, 'K-283': 5, 'K-409': 5, 'B-163': 6, 'B-233': 5, 'B-283': 6, 'B-409': 5, 'B-571': 6, 'K-571': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side-channels': 2}, 'FI': {'Physical tampering': 1, 'physical tampering': 4, 'Malfunction': 5, 'malfunction': 2}}, 'technical_report_id': {'BSI': {'BSI TR-02101': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-3': 17, 'FIPS PUB 197': 9, 'FIPS PUB 180-4': 7, 'FIPS PUB 198-1': 3, 'FIPS PUB 113': 3}, 'NIST': {'NIST SP 800-67': 4, 'SP 800-108': 3, 'NIST SP 800-38B': 4, 'NIST SP 800-38D': 2, 'NIST SP 800-90A': 1, 'NIST SP 800-90': 2, 'SP 800-57': 2, 'NIST SP 800-56A': 1, 'NIST SP 800-57': 1, 'SP 800-38D': 1, 'SP 800-38B': 1}, 'PKCS': {'PKCS #11': 10, 'PKCS#11': 3, 'PKCS #1': 9, 'PKCS #8': 2}, 'BSI': {'AIS 20': 2, 'AIS 31': 2, 'AIS20': 1, 'AIS31': 1}, 'ISO': {'ISO/IEC 15408-1': 1, 'ISO/IEC 15408-2': 1, 'ISO/IEC 15408-3': 1, 'ISO/IEC 19790:2012': 5}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'NL': {'CC-17-179205': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 1, 'EAL7': 1, 'EAL4': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to [CR] NSCIB-CC-179205-CR.pdf.
    • The st_filename property was set to [ST] CR-3524_23 - Security Target.pdf.
    • The cert_filename property was set to Get cert CC-17-179205.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to [''].
    • The cert_id property was set to NSCIB-CC-179205-CR.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-38671-CR']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-38671-CR']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-179205-CR.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20CR-3524_23%20-%20Security%20Target.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Luna PCI-E Cryptographic Module, Firmware version 6.10.9 (AVA_VAN.5) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Products for Digital Signatures",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Get%20cert%20CC-17-179205.pdf",
  "dgst": "5aff27b2a405d882",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-179205-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "6.10.9"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-38671-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-38671-CR"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "SafeNet Inc.",
  "manufacturer_web": "https://www.safenet-inc.com/",
  "name": "Luna PCI-E Cryptographic Module, Firmware version 6.10.9 (AVA_VAN.5)",
  "not_valid_after": "2022-12-29",
  "not_valid_before": "2017-12-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Get cert CC-17-179205.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "CC-17-179205": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20171229160529+01\u002700\u0027",
      "/Creator": "BHC364e",
      "/ModDate": "D:20171229160529+01\u002700\u0027",
      "/Producer": "KONICA MINOLTA bizhub C364e",
      "/Title": "BHC364e-20171229160529",
      "pdf_file_size_bytes": 194726,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "[CR] NSCIB-CC-179205-CR.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-179205-CR",
        "cert_item": "Luna PCI-E Cryptographic Module, Firmware Version 6.10.9",
        "cert_lab": " Brightsight",
        "developer": "SafeNet Inc"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDSA": {
            "ECDSA": 2
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "CC-17-38671": 2,
          "CC-38671": 2,
          "NSCIB-CC-179205-CR": 13
        }
      },
      "cc_claims": {
        "OE": {
          "OE.ENV": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 2
        },
        "AVA": {
          "AVA_VAN.4": 2,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 3,
          "EAL4 augmented": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {
        "FPT": {
          "FPT_PHP": 1,
          "FPT_PHP.1": 1,
          "FPT_PHP.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "interfaces not exposed to the host computer (such as serial and USB interfaces on the device), are out of scope of these evaluations. The user of the TOE is reminded to operate the TOE in a physically and": 2,
          "out of scope": 2,
          "such as serial and USB interfaces on the device), are out of scope of these evaluations": 2
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side channel": 1
        }
      },
      "standard_id": {},
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "TDES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "p646",
      "/CreationDate": "D:20171229163718+01\u002700\u0027",
      "/Creator": "PDFCreator Version 1.2.0",
      "/Keywords": "",
      "/ModDate": "D:20171229163718+01\u002700\u0027",
      "/Producer": "GPL Ghostscript  9.0",
      "/Subject": "",
      "/Title": "Certification Report NSCIB-CC-179205-CR",
      "pdf_file_size_bytes": 575783,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "[ST] CR-3524_23 - Security Target.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 8
          },
          "ECIES": {
            "ECIES": 1
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 2
          },
          "DSA": {
            "DSA": 9
          }
        },
        "RSA": {
          "RSA 1024": 4
        }
      },
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-00078": 1,
          "BSI-CC-PP-00080": 1,
          "BSI-CC-PP-0078": 6,
          "BSI-PP-00078": 1,
          "BSI-PP-CC-00078": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 5,
          "ADV_FSP.4": 5,
          "ADV_IMP.1": 3,
          "ADV_TDS.3": 4
        },
        "AGD": {
          "AGD_OPE.1": 3,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.2": 19,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.3": 2,
          "AVA_VAN.5": 11
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 6,
          "EAL 4 augmented": 3,
          "EAL4": 3,
          "EAL4 augmented": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM": 72,
          "FCS_CKM.1": 18,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 17,
          "FCS_CKM.4": 15,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 37,
          "FCS_COP.1": 10,
          "FCS_RNG": 3,
          "FCS_RNG.1": 12,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 31,
          "FDP_ACC.1": 11,
          "FDP_ACC.2": 8,
          "FDP_ACF": 33,
          "FDP_ACF.1": 22,
          "FDP_ACF.1.4": 1,
          "FDP_ETC.2": 8,
          "FDP_ETC.2.1": 1,
          "FDP_ETC.2.2": 1,
          "FDP_ETC.2.3": 1,
          "FDP_ETC.2.4": 2,
          "FDP_IFC.1": 4,
          "FDP_ITC.1": 4,
          "FDP_ITC.2": 17,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.2": 1,
          "FDP_ITC.2.3": 1,
          "FDP_ITC.2.4": 1,
          "FDP_ITC.2.5": 2,
          "FDP_RIP.2": 6,
          "FDP_RIP.2.1": 1,
          "FDP_UCT.1": 1,
          "FDP_UIT.1": 1
        },
        "FIA": {
          "FIA_AFL": 15,
          "FIA_AFL.1": 7,
          "FIA_ATD.1": 8,
          "FIA_ATD.1.1": 1,
          "FIA_UAU.1": 9,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.6": 5,
          "FIA_UAU.6.1": 1,
          "FIA_UAU.7": 5,
          "FIA_UAU.7.1": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 10,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 5,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF": 14,
          "FMT_MOF.1": 4,
          "FMT_MSA": 26,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 12,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 15,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 12,
          "FMT_MTD.1": 3,
          "FMT_SMF.1": 13,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 10,
          "FMT_SMR.2": 12,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_EMS": 3,
          "FPT_EMS.1": 11,
          "FPT_EMS.1.1": 2,
          "FPT_EMS.1.2": 2,
          "FPT_FLS.1": 11,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 14,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 11,
          "FPT_PHP.3.1": 1,
          "FPT_STM.1": 1,
          "FPT_TDC.1": 15,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 8,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1,
          "FPT_TST.2": 16,
          "FPT_TST.2.1": 3,
          "FPT_TST.2.2": 2,
          "FPT_TST.2.3": 2,
          "FPT_TST.2.4": 2,
          "FPT_TST.2.5": 2,
          "FPT_TST.2.6": 3,
          "FPT_TST.2.7": 2,
          "FPT_TST.2.8": 2
        },
        "FTP": {
          "FTP_ITC": 11,
          "FTP_ITC.1": 4,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 15
        },
        "ECB": {
          "ECB": 8
        },
        "GCM": {
          "GCM": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 16
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "B-163": 6,
          "B-233": 5,
          "B-283": 6,
          "B-409": 5,
          "B-571": 6,
          "K-163": 5,
          "K-233": 5,
          "K-283": 5,
          "K-409": 5,
          "K-571": 4,
          "P-192": 12,
          "P-224": 10,
          "P-256": 12,
          "P-384": 10,
          "P-521": 12
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 16
          },
          "SHA2": {
            "SHA-224": 10,
            "SHA-256": 16,
            "SHA-384": 14,
            "SHA-512": 9
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 3
        },
        "RNG": {
          "RNG": 8
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 5,
          "Physical tampering": 1,
          "malfunction": 2,
          "physical tampering": 4
        },
        "SCA": {
          "physical probing": 1,
          "side-channels": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 31": 2,
          "AIS20": 1,
          "AIS31": 1
        },
        "FIPS": {
          "FIPS PUB 113": 3,
          "FIPS PUB 180-4": 7,
          "FIPS PUB 186-3": 17,
          "FIPS PUB 197": 9,
          "FIPS PUB 198-1": 3
        },
        "ISO": {
          "ISO/IEC 15408-1": 1,
          "ISO/IEC 15408-2": 1,
          "ISO/IEC 15408-3": 1,
          "ISO/IEC 19790:2012": 5
        },
        "NIST": {
          "NIST SP 800-38B": 4,
          "NIST SP 800-38D": 2,
          "NIST SP 800-56A": 1,
          "NIST SP 800-57": 1,
          "NIST SP 800-67": 4,
          "NIST SP 800-90": 2,
          "NIST SP 800-90A": 1,
          "SP 800-108": 3,
          "SP 800-38B": 1,
          "SP 800-38D": 1,
          "SP 800-57": 2
        },
        "PKCS": {
          "PKCS #1": 9,
          "PKCS #11": 10,
          "PKCS #8": 2,
          "PKCS#11": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 36,
            "AES-256": 4,
            "AES256": 2
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 27
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 8,
            "HMAC": 9
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-02101": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 3
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20171208160736+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20171208160736+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "pdf_file_size_bytes": 1327623,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 117
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-179205-CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "ALC_FLR.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20CR-3524_23%20-%20Security%20Target.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "9e80a8ec0910911b69a4ce72ceb05cdb076298074ddb7b288e50dd4bab12d6f6",
      "txt_hash": "2e5d627f21d869355ee28a85ea728e68a1cdbc859220b5c36a221c18a80e1d76"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2ac96e082ad25a2e7dfe2f058057c1c6dc83db3318ffce270b98be4aa3a75d9e",
      "txt_hash": "491e4fd8a37861dff4b7e6cc8f346d8822cd6a8205bde1f385d2390e56840dcc"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d5b7ed6b7f6bb89bc5dbd7edbc61b84f7ace9a37e75e7af5f45fb7a714e8fffb",
      "txt_hash": "12c67b2a5f54c15759520380a0a67bd41a68a260139b1be1dc1837313e063148"
    }
  },
  "status": "archived"
}