MTCOS Smart Tachograph V2 / SLE78CFX4000P

CSV information ?

Status active
Valid from 03.06.2022
Valid until 03.06.2027
Scheme 🇩🇪 DE
Manufacturer MaskTech International GmbH
Category Other Devices and Systems
Security level EAL4+, ALC_DVS.2, AVA_VAN.2, ATE_DPT.2

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1088-2022

Certificate ?

Extracted keywords

Security level
EAL 4, EAL 5, EAL 2, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ATE_DPT.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0091-2017
Certificates
BSI-DSZ-CC-1088-2022

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certificate BSI-DSZ-CC-1088-2022
Subject Common Criteria Certification
Keywords Common Criteria, Certification, Zertifizierung, Tachograph Card
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20220613083859+02'00'
Modification date D:20220613084333+02'00'
Pages 1
Creator Writer
Producer LibreOffice 6.3

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-2
Randomness
RNG
Libraries
v1.02.013
Elliptic Curves
P-256, P-384, P-521, NIST P-256, NIST P-384, NIST P-521
Block cipher modes
CBC

Vendor
Infineon, Infineon Technologies AG

Security level
EAL 4, EAL 5, EAL 2, EAL 1, EAL 2+, EAL 6, EAL5+, EAL6, EAL 5+, EAL6+, EAL 4 augmented, EAL 6 augmented, EAL6 augmented
Claims
OE.EOL
Security Assurance Requirements (SAR)
ADV_ARC, ALC_DVS.2, ALC_FLR, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0091-2017, BSI-CC-PP-0091
Certificates
BSI-DSZ-CC-1088-2022
Evaluation facilities
TÃœV Informationstechnik, SRC Security Research & Consulting
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Digital Tachograph – Tachograph Card, Version 1.0, 10 March 2022, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1088-2022, Security Target lite – MTCOS Smart Tachograph V2 , Tachograph V2 / SLE78CFX4000P, Version 1.5, 12 May 2022, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-1088-2022, Configuration List – MTCOS Smart Tachograph V2 , Version 0.6, 10 May 2022, MaskTech International GmbH (confidential document) [11] User Guidance BSI-DSZ-CC-1088-2022, User Guidance – MTCOS Smart Tachograph V2 / SLE78CFX4000P, Criteria CCv3.1 EAL6 augmented (EAL6+), Version 4.1, 21 October 2020, Infineon Technologies AG (confidential document) Security Target Lite BSI-DSZ-CC-0782-V5, Security Target Lite M7892 B11 Recertification Common, for Composite Evaluation (ETR COMP), BSI-DSZ-CC- 0782-V5, Version 5, TÜV Informationstechnik GmbH (confidential document) [15] COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 of 18 March 2016 implementing Regulation (EU

Side-channel analysis
side channel, malfunction, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Digital Tachograph – Tachograph Card, Version 1.0, 10 March 2022, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1088-2022, Security Target lite – MTCOS Smart Tachograph V2 , Tachograph V2 / SLE78CFX4000P, Version 1.5, 12 May 2022, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-1088-2022, Configuration List – MTCOS Smart Tachograph V2 , Version 0.6, 10 May 2022, MaskTech International GmbH (confidential document) [11] User Guidance BSI-DSZ-CC-1088-2022, User Guidance – MTCOS Smart Tachograph V2 / SLE78CFX4000P, Criteria CCv3.1 EAL6 augmented (EAL6+), Version 4.1, 21 October 2020, Infineon Technologies AG (confidential document) Security Target Lite BSI-DSZ-CC-0782-V5, Security Target Lite M7892 B11 Recertification Common, for Composite Evaluation (ETR COMP), BSI-DSZ-CC- 0782-V5, Version 5, TÜV Informationstechnik GmbH (confidential document) [15] COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 of 18 March 2016 implementing Regulation (EU

Standards
AIS 34, AIS 36, AIS 37, AIS 26, AIS 25, AIS 20, AIS 31, AIS 46, AIS 35, AIS 1, AIS 14, AIS 19, AIS 32, AIS 38, RFC 5480, RFC 5639, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 7816
Technical reports
BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1088-2022
Subject Common Criteria Certification
Keywords "Common Criteria, Certification, Zertifizierung, Tachograph Card"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20220613082516+02'00'
Modification date D:20220613084257+02'00'
Pages 29
Creator Writer
Producer LibreOffice 6.3

Frontpage

Certificate ID BSI-DSZ-CC-1088-2022
Certified item MTCOS Smart Tachograph V2 / SLE78CFX4000P
Certification lab BSI
Developer MaskTech International GmbH

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, 3DES, TDEA, HMAC, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-224, SHA-2
Schemes
MAC, Key agreement
Randomness
TRNG, RNG, RND
Elliptic Curves
P-256, P-384, P-521, NIST P-256, NIST P-384, NIST P-521, secp256r1, secp384r1, secp521r1, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1
Block cipher modes
CBC

Trusted Execution Environments
SSC
Vendor
Infineon Technologies AG, Infineon

Security level
EAL4, EAL6, EAL4 augmented, EAL6 augmented
Claims
O.RND, OE.EOL
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_FLR.1, ATE_DPT.2, ATE_FUN.1, ATE_DPT.1, ATE_COV.2, ATE_IND.2, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FAU_GEN.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAS.1, FCO_NRO.1, FCO_NRO.1.1, FCO_NRO.1.2, FCO_NRO.1.3, FCS_RNG, FCS_RNG.1, FCS_CKM.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM, FCS_CKM.2, FCS_CKM.4, FCS_COP, FCS_COP.1, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_DAU.1, FDP_ETC.1, FDP_ETC.2, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_SDI.2, FDP_ACC.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_IFC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FIA_SOS.2, FIA_AFL, FIA_AFL.1, FIA_ATD, FIA_ATD.1, FIA_UAU.3, FIA_UAU.4, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UAU, FIA_UAU.1, FIA_UID.1, FIA_UAU.3.1, FIA_UAU.3.2, FIA_UAU.4.1, FIA_UID.2.1, FMT_MSA.3, FMT_LIM.1, FMT_LIM.2, FMT_MSA.1, FMT_SMF.1, FPR_UNO.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_PHP.3, FPT_TST.1, FPT_TDC, FPT_TDC.1, FPT_ITC.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0035-2007, BSI-CC-PP-0084-2014, BSI-CC-PP-0091-2017
Certificates
BSI-DSZ-CC-1088, BSI-DSZ-CC-0782-V5-2020
Certification process
Out of scope, A.3. RSA Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU.PK (conditional, possibly multiple) VU, by VU or VU man- ufacturer; obtained by card in VU certificate during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MS.PK (conditional, possibly multiple, foreign) MSCA; obtained by card in MS certifi- cate presented by a VU during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.1: First-generation asymmetric, inserted in card by card manufacturer. Note: See [REG_2016/799] An- nex 1C, Appendix 11, CSM_105. Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory, A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory EUR.PK (previous) (conditional; only, A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory 94 Key Symbol Description Purpose Type, EUR.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple, by VU or VU man- ufacturer; obtained by card in VU_MA certificate during mu- tual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MSCA_VU- EGF.PK (conditional, possibly, ECC Generated by MSCA; obtained by card in MSCA_VU-EGF cer- tificate during mutual authen- tication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.4: Second-generation asymmetric, section 12.2, a workshop card may contain up to three keys KM-WC (of consecutive key generations). Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory, DSRC channel AES Generated by ERCA Note: Workshop and control cards may contain up to 3 KMDSRC keys Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory

Side-channel analysis
Leak-Inherent, physical probing, SPA, DPA, timing attacks, Malfunction, malfunction
Certification process
Out of scope, A.3. RSA Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU.PK (conditional, possibly multiple) VU, by VU or VU man- ufacturer; obtained by card in VU certificate during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MS.PK (conditional, possibly multiple, foreign) MSCA; obtained by card in MS certifi- cate presented by a VU during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.1: First-generation asymmetric, inserted in card by card manufacturer. Note: See [REG_2016/799] An- nex 1C, Appendix 11, CSM_105. Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory, A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory EUR.PK (previous) (conditional; only, A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory 94 Key Symbol Description Purpose Type, EUR.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple, by VU or VU man- ufacturer; obtained by card in VU_MA certificate during mu- tual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MSCA_VU- EGF.PK (conditional, possibly, ECC Generated by MSCA; obtained by card in MSCA_VU-EGF cer- tificate during mutual authen- tication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.4: Second-generation asymmetric, section 12.2, a workshop card may contain up to three keys KM-WC (of consecutive key generations). Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory, DSRC channel AES Generated by ERCA Note: Workshop and control cards may contain up to 3 KMDSRC keys Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory

Standards
FIPS PUB 180-4, FIPS 180-1, FIPS 46-3, NIST SP 800-38B, NIST SP 800-67, NIST SP 800-90A, PKCS #1, AIS 31, RFC 5480, RFC 5639, RFC 5869, RFC 8017, ISO/IEC 7810, ISO/IEC 7816, ISO/IEC 10373, ISO/IEC 10116-2017, ISO/IEC 9796-2, ISO/IEC 19790:2012, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title MTCOS Smart Tachograph V2 / SLE78CFX4000P- Security Target lite
Subject Common Criteria Certification
Keywords Common Criteria, CC, Digital Tachograph – Tachograph Card, MTCOS, EAL 4+
Author MaskTech International GmbH
Creation date D:20220406102943+02'00'
Modification date D:20220406102943+02'00'
Pages 102
Creator LaTeX with hyperref
Producer pdfTeX-1.40.20

References

Outgoing
  • BSI-DSZ-CC-0782-V5-2020 - active - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003, EC v1.02.013 or v2.07.003, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003, and Toolbox v1.02.013 or v2.07.003 libraries and with specific IC dedicated software (firmware)

Heuristics ?

Certificate ID: BSI-DSZ-CC-1088-2022

Extracted SARs

AVA_VAN.2, ASE_ECD.1, ALC_FLR.1, ALC_DEL.1, AGD_PRE.1, ADV_IMP.1, ALC_LCD.1, ADV_FSP.4, ATE_FUN.1, ASE_REQ.2, ALC_CMS.4, ALC_TAT.1, ASE_CCL.1, ASE_OBJ.2, ATE_COV.2, ADV_ARC.1, ALC_DVS.2, ATE_IND.2, ASE_SPD.1, AGD_OPE.1, ASE_INT.1, ALC_CMC.4, ATE_DPT.2, ASE_TSS.1, ADV_TDS.3

Scheme data ?

Cert Id BSI-DSZ-CC-1088-2022
Product MTCOS Smart Tachograph V2 / SLE78CFX4000P
Vendor MaskTech International GmbH
Certification Date 03.06.2022
Category Digital tachograph
Url https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitaler_Tachograph-Tachographkarten/1088.html
Enhanced
Product MTCOS Smart Tachograph V2 / SLE78CFX4000P
Applicant MaskTech International GmbH Nordostpark 45 90411 Nürnberg
Evaluation Facility SRC Security Research & Consulting GmbH
Assurance Level EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5
Protection Profile Digital Tachograph - Tachograph Card (TC PP) Version 1.0, 19 May 2017, BSI-CC-PP-0091-2017
Certification Date 03.06.2022
Expiration Date 02.06.2027
Report Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088a_pdf.pdf?__blob=publicationFile&v=3
Target Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088b_pdf.pdf?__blob=publicationFile&v=4
Cert Link https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088c_pdf.pdf?__blob=publicationFile&v=3
Description The Target of Evaluation (TOE) is a second generation version 2 Tachograph Card in the sense of COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 and COMMISSION IMPLEMENTING REGULATION (EU) 2021/1228, Annex 1C. It is intended to be used in the 1st generation and 2nd generation version 2 Digital Tachograph Systems, which contain additionally further components as motion sensors (of the 1st or 2nd generation), vehicle units (of the 1st or 2nd generation), remote early detection communication readers and, if applicable, external GNSS modules and remote communication facilities. The TOE provides different configurations and is implemented in the four different card types as driver card, workshop card, control card and company card in accordance with the Digital Tachograph System specifications given by COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 and COMMISSION IMPLEMENTING REGULATION (EU) 2021/1228, Annex 1C, Appendix 2, Appendix 10 and Appendix 11.
Subcategory Tachograph Cards

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '97e00bc334faad13502bca895f4f5d0aa605613a0b663105028351cedab504b7', 'txt_hash': '840d0f1e1211b4bc8f0553ff9d798ba83c485839d7cd10358edab9fc3233af0a'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '33394a7032ca4335ff61bd3e138e13063f36abce3cebc28487b8486f74508ad0', 'txt_hash': '534603bc706d53f9ec1cbda9b247e73d4f7e29b1cefaec027b0ec5a52f75f086'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4c019f72119f887708ad55572366079d38178695e03bb801a748941c6a59a5ea', 'txt_hash': '2abc57df05096772ca5877415e6912b6eab62da43ffa0d2cd392b5bfd1e31abe'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 632204, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 29, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20220613082516+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, Tachograph Card"', '/ModDate': "D:20220613084257+02'00'", '/Producer': 'LibreOffice 6.3', '/Subject': 'Common Criteria Certification', '/Title': 'Certification Report BSI-DSZ-CC-1088-2022', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/', 'http://www.commoncriteriaportal.org/cc/', 'https://www.bsi.bund.de/AIS', 'https://www.sogis.eu/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 487471, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 102, '/Author': 'MaskTech International GmbH', '/Title': 'MTCOS Smart Tachograph V2 / SLE78CFX4000P- Security Target lite', '/Subject': 'Common Criteria Certification', '/Creator': 'LaTeX with hyperref', '/Producer': 'pdfTeX-1.40.20', '/Keywords': 'Common Criteria, CC, Digital Tachograph – Tachograph Card, MTCOS, EAL 4+', '/CreationDate': "D:20220406102943+02'00'", '/ModDate': "D:20220406102943+02'00'", '/Trapped': '/False', '/PTEX.Fullbanner': 'This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019/Cygwin) kpathsea version 6.3.1', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 254122, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20220613083859+02'00'", '/Creator': 'Writer', '/Keywords': 'Common Criteria, Certification, Zertifizierung, Tachograph Card', '/ModDate': "D:20220613084333+02'00'", '/Producer': 'LibreOffice 6.3', '/Subject': 'Common Criteria Certification', '/Title': 'Certificate BSI-DSZ-CC-1088-2022', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1088-2022', 'cert_item': 'MTCOS Smart Tachograph V2 / SLE78CFX4000P', 'developer': 'MaskTech International GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Digital Tachograph - Tachograph Card (TC PP) Version 1.0, 19 May 2017, BSI-CC-PP-0091-2017', 'cc_version': 'PP conformant Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1088-2022': 20}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0091-2017': 4, 'BSI-CC-PP-0091': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 5, 'EAL 5': 4, 'EAL 2': 2, 'EAL 1': 1, 'EAL 2+': 1, 'EAL 6': 2, 'EAL5+': 1, 'EAL6': 3, 'EAL 5+': 1, 'EAL6+': 2, 'EAL 4 augmented': 3, 'EAL 6 augmented': 1, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_FLR': 2, 'ALC_FLR.1': 1, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 4}, 'AVA': {'AVA_VAN.5': 4}}, 'cc_sfr': {}, 'cc_claims': {'OE': {'OE.EOL': 1}}, 'vendor': {'Infineon': {'Infineon': 6, 'Infineon Technologies AG': 11}}, 'eval_facility': {'TUV': {'TÃœV Informationstechnik': 1}, 'SRC': {'SRC Security Research & Consulting': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}, 'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 3}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 2}}, 'cipher_mode': {'CBC': {'CBC': 2}}, 'ecc_curve': {'NIST': {'P-256': 1, 'P-384': 1, 'P-521': 1, 'NIST P-256': 1, 'NIST P-384': 1, 'NIST P-521': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 4}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 1}, 'FI': {'malfunction': 1}, 'other': {'JIL': 6}}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 4, 'AIS 36': 4, 'AIS 37': 3, 'AIS 26': 4, 'AIS 25': 4, 'AIS 20': 3, 'AIS 31': 3, 'AIS 46': 3, 'AIS 35': 2, 'AIS 1': 1, 'AIS 14': 1, 'AIS 19': 1, 'AIS 32': 1, 'AIS 38': 1}, 'RFC': {'RFC 5480': 1, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 15408': 4, 'ISO/IEC 18045': 4, 'ISO/IEC 17065': 2, 'ISO/IEC 7816': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Digital Tachograph – Tachograph Card, Version 1.0, 10 March 2022, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1088-2022, Security Target lite – MTCOS Smart Tachograph V2 ': 1, 'Tachograph V2 / SLE78CFX4000P, Version 1.5, 12 May 2022, SRC Security Research & Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-1088-2022, Configuration List – MTCOS Smart Tachograph V2 ': 1, 'Version 0.6, 10 May 2022, MaskTech International GmbH (confidential document) [11] User Guidance BSI-DSZ-CC-1088-2022, User Guidance – MTCOS Smart Tachograph V2 / SLE78CFX4000P': 1, 'Criteria CCv3.1 EAL6 augmented (EAL6+), Version 4.1, 21 October 2020, Infineon Technologies AG (confidential document) Security Target Lite BSI-DSZ-CC-0782-V5, Security Target Lite M7892 B11 Recertification Common': 1, 'for Composite Evaluation (ETR COMP), BSI-DSZ-CC- 0782-V5, Version 5, TÃœV Informationstechnik GmbH (confidential document) [15] COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 of 18 March 2016 implementing Regulation (EU': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1088': 2, 'BSI-DSZ-CC-0782-V5-2020': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 2, 'BSI-CC-PP-0084-2014': 1, 'BSI-CC-PP-0091-2017': 1}}, 'cc_security_level': {'EAL': {'EAL4': 15, 'EAL6': 2, 'EAL4 augmented': 5, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 3, 'ADV_TDS.3': 3, 'ADV_FSP.4': 2, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_DVS.2': 11, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_FLR.1': 1}, 'ATE': {'ATE_DPT.2': 11, 'ATE_FUN.1': 2, 'ATE_DPT.1': 1, 'ATE_COV.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 11}, 'ASE': {'ASE_INT.1': 3, 'ASE_CCL.1': 3, 'ASE_SPD.1': 3, 'ASE_OBJ.2': 3, 'ASE_ECD.1': 3, 'ASE_REQ.2': 3, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 9, 'FAU_SAA.1': 8, 'FAU_ARP.1.1': 1, 'FAU_GEN.1': 3, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO.1': 12, 'FCO_NRO.1.1': 1, 'FCO_NRO.1.2': 1, 'FCO_NRO.1.3': 1}, 'FCS': {'FCS_RNG': 5, 'FCS_RNG.1': 17, 'FCS_CKM.1': 30, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM': 105, 'FCS_CKM.2': 10, 'FCS_CKM.4': 29, 'FCS_COP': 79, 'FCS_COP.1': 20}, 'FDP': {'FDP_ACC': 26, 'FDP_ACC.2': 8, 'FDP_ACF': 23, 'FDP_ACF.1': 16, 'FDP_DAU.1': 12, 'FDP_ETC.1': 7, 'FDP_ETC.2': 6, 'FDP_ITC.1': 39, 'FDP_ITC.2': 41, 'FDP_RIP.1': 8, 'FDP_SDI.2': 14, 'FDP_ACC.1': 11, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_IFC.1': 8, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ITC.2.1': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 1, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 2, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITT.1': 1}, 'FIA': {'FIA_SOS.2': 1, 'FIA_AFL': 23, 'FIA_AFL.1': 8, 'FIA_ATD': 14, 'FIA_ATD.1': 8, 'FIA_UAU.3': 12, 'FIA_UAU.4': 8, 'FIA_UID.2': 10, 'FIA_USB': 13, 'FIA_USB.1': 7, 'FIA_UAU': 20, 'FIA_UAU.1': 14, 'FIA_UID.1': 7, 'FIA_UAU.3.1': 1, 'FIA_UAU.3.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UID.2.1': 1}, 'FMT': {'FMT_MSA.3': 8, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_MSA.1': 1, 'FMT_SMF.1': 1}, 'FPR': {'FPR_UNO.1': 12}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 18, 'FPT_EMS.1.1': 2, 'FPT_EMS.1.2': 2, 'FPT_FLS.1': 10, 'FPT_PHP.3': 14, 'FPT_TST.1': 10, 'FPT_TDC': 18, 'FPT_TDC.1': 8, 'FPT_ITC.1': 1, 'FPT_FLS.1.1': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 16, 'FTP_ITC.1': 9, 'FTP_TRP.1': 2}}, 'cc_claims': {'O': {'O.RND': 1}, 'OE': {'OE.EOL': 4}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 6, 'Infineon': 4}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 40}}, 'DES': {'DES': {'DES': 6}, '3DES': {'TDES': 17, '3DES': 5, 'TDEA': 1}}, 'constructions': {'MAC': {'HMAC': 2, 'KMAC': 1, 'CMAC': 10}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 11}, 'ECC': {'ECC': 14}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 10}, 'SHA2': {'SHA-256': 7, 'SHA-384': 3, 'SHA-512': 3, 'SHA-224': 1, 'SHA-2': 7}}}, 'crypto_scheme': {'MAC': {'MAC': 6}, 'KA': {'Key agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RNG': 7, 'RND': 1}}, 'cipher_mode': {'CBC': {'CBC': 10}}, 'ecc_curve': {'NIST': {'P-256': 1, 'P-384': 1, 'P-521': 1, 'NIST P-256': 1, 'NIST P-384': 1, 'NIST P-521': 1, 'secp256r1': 4, 'secp384r1': 1, 'secp521r1': 4}, 'Brainpool': {'brainpoolP256r1': 4, 'brainpoolP384r1': 1, 'brainpoolP512r1': 4}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'physical probing': 5, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'Malfunction': 1, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 3}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-4': 1, 'FIPS 180-1': 2, 'FIPS 46-3': 1}, 'NIST': {'NIST SP 800-38B': 1, 'NIST SP 800-67': 1, 'NIST SP 800-90A': 1}, 'PKCS': {'PKCS #1': 1}, 'BSI': {'AIS 31': 1}, 'RFC': {'RFC 5480': 1, 'RFC 5639': 1, 'RFC 5869': 1, 'RFC 8017': 1}, 'ISO': {'ISO/IEC 7810': 2, 'ISO/IEC 7816': 4, 'ISO/IEC 10373': 2, 'ISO/IEC 10116-2017': 1, 'ISO/IEC 9796-2': 1, 'ISO/IEC 19790:2012': 1}, 'ICAO': {'ICAO': 2}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'Out of scope': 11, 'A.3. RSA Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU.PK (conditional, possibly multiple) VU': 1, 'by VU or VU man- ufacturer; obtained by card in VU certificate during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MS.PK (conditional, possibly multiple': 1, 'foreign) MSCA; obtained by card in MS certifi- cate presented by a VU during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.1: First-generation asymmetric': 1, 'inserted in card by card manufacturer. Note: See [REG_2016/799] An- nex 1C, Appendix 11, CSM_105. Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory': 1, 'A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory EUR.PK (previous) (conditional; only': 1, 'A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory 94 Key Symbol Description Purpose Type': 1, 'EUR.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple': 1, 'by VU or VU man- ufacturer; obtained by card in VU_MA certificate during mu- tual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MSCA_VU- EGF.PK (conditional, possibly': 1, 'ECC Generated by MSCA; obtained by card in MSCA_VU-EGF cer- tificate during mutual authen- tication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.4: Second-generation asymmetric': 1, 'section 12.2, a workshop card may contain up to three keys KM-WC (of consecutive key generations). Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory': 1, 'DSRC channel AES Generated by ERCA Note: Workshop and control cards may contain up to 3 KMDSRC keys Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1088-2022': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0091-2017': 1}}, 'cc_security_level': {'EAL': {'EAL 4': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}, 'ATE': {'ATE_DPT.2': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 1088a_pdf.pdf.
    • The st_filename property was set to 1088b_pdf.pdf.
    • The cert_filename property was set to 1088c_pdf.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-1088-2022.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V5-2020']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-V5-2020']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1088a_pdf.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1088b_pdf.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name MTCOS Smart Tachograph V2 / SLE78CFX4000P was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1088c_pdf.pdf",
  "dgst": "89245415f575b632",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1088-2022",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Digital tachograph",
      "cert_id": "BSI-DSZ-CC-1088-2022",
      "certification_date": "03.06.2022",
      "enhanced": {
        "applicant": "MaskTech International GmbH\nNordostpark 45 \n90411 N\u00fcrnberg",
        "assurance_level": "EAL4+,ALC_DVS.2,ATE_DPT.2,AVA_VAN.5",
        "cert_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088c_pdf.pdf?__blob=publicationFile\u0026v=3",
        "certification_date": "03.06.2022",
        "description": "The Target of Evaluation (TOE) is a second generation version 2 Tachograph Card in the sense of COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 and COMMISSION IMPLEMENTING REGULATION (EU) 2021/1228, Annex 1C. It is intended to be used in the 1st generation and 2nd generation version 2 Digital Tachograph Systems, which contain additionally further components as motion sensors (of the 1st or 2nd generation), vehicle units (of the 1st or 2nd generation), remote early detection communication readers and, if applicable, external GNSS modules and remote communication facilities.\n \nThe TOE provides different configurations and is implemented in the four different card types as driver card, workshop card, control card and company card in accordance with the Digital Tachograph System specifications given by COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 and COMMISSION IMPLEMENTING REGULATION (EU) 2021/1228, Annex 1C, Appendix 2, Appendix 10 and Appendix 11.",
        "evaluation_facility": "SRC Security Research \u0026 Consulting GmbH",
        "expiration_date": "02.06.2027",
        "product": "MTCOS Smart Tachograph V2 / SLE78CFX4000P",
        "protection_profile": "Digital Tachograph - Tachograph Card (TC PP) Version 1.0, 19 May 2017, BSI-CC-PP-0091-2017",
        "report_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088a_pdf.pdf?__blob=publicationFile\u0026v=3",
        "target_link": "https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1088b_pdf.pdf?__blob=publicationFile\u0026v=4"
      },
      "product": "MTCOS Smart Tachograph V2 / SLE78CFX4000P",
      "subcategory": "Tachograph Cards",
      "url": "https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitaler_Tachograph-Tachographkarten/1088.html",
      "vendor": "MaskTech International GmbH"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-V5-2020"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0782-V5-2020"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "MaskTech International GmbH",
  "manufacturer_web": "https://www.masktech.de/",
  "name": "MTCOS Smart Tachograph V2 / SLE78CFX4000P",
  "not_valid_after": "2027-06-03",
  "not_valid_before": "2022-06-03",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1088c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1088-2022": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0091-2017": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "ATE": {
          "ATE_DPT.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL 5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20220613083859+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, Tachograph Card",
      "/ModDate": "D:20220613084333+02\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certificate BSI-DSZ-CC-1088-2022",
      "pdf_file_size_bytes": 254122,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1088a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2 and AVA_VAN.5",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1088-2022",
        "cert_item": "MTCOS Smart Tachograph V2 / SLE78CFX4000P",
        "cert_lab": "BSI",
        "developer": "MaskTech International GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Digital Tachograph - Tachograph Card (TC PP) Version 1.0, 19 May 2017, BSI-CC-PP-0091-2017"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 3
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1088-2022": 20
        }
      },
      "cc_claims": {
        "OE": {
          "OE.EOL": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0091": 1,
          "BSI-CC-PP-0091-2017": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 5,
          "ALC_FLR": 2,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_DPT.2": 4
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 2,
          "EAL 2+": 1,
          "EAL 4": 5,
          "EAL 4 augmented": 3,
          "EAL 5": 4,
          "EAL 5+": 1,
          "EAL 6": 2,
          "EAL 6 augmented": 1,
          "EAL5+": 1,
          "EAL6": 3,
          "EAL6 augmented": 2,
          "EAL6+": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Criteria CCv3.1 EAL6 augmented (EAL6+), Version 4.1, 21 October 2020, Infineon Technologies AG (confidential document) Security Target Lite BSI-DSZ-CC-0782-V5, Security Target Lite M7892 B11 Recertification Common": 1,
          "Digital Tachograph \u2013 Tachograph Card, Version 1.0, 10 March 2022, MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1088-2022, Security Target lite \u2013 MTCOS Smart Tachograph V2 ": 1,
          "Tachograph V2 / SLE78CFX4000P, Version 1.5, 12 May 2022, SRC Security Research \u0026 Consulting GmbH (confidential document) [10] Configuration List BSI-DSZ-CC-1088-2022, Configuration List \u2013 MTCOS Smart Tachograph V2 ": 1,
          "Version 0.6, 10 May 2022, MaskTech International GmbH (confidential document) [11] User Guidance BSI-DSZ-CC-1088-2022, User Guidance \u2013 MTCOS Smart Tachograph V2 / SLE78CFX4000P": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "for Composite Evaluation (ETR COMP), BSI-DSZ-CC- 0782-V5, Version 5, T\u00dcV Informationstechnik GmbH (confidential document) [15] COMMISSION IMPLEMENTING REGULATION (EU) 2016/799 of 18 March 2016 implementing Regulation (EU": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Infineon": {
          "v1.02.013": 4
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-256": 1,
          "NIST P-384": 1,
          "NIST P-521": 1,
          "P-256": 1,
          "P-384": 1,
          "P-521": 1
        }
      },
      "eval_facility": {
        "SRC": {
          "SRC Security Research \u0026 Consulting": 3
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-2": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        },
        "SCA": {
          "side channel": 1
        },
        "other": {
          "JIL": 6
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 14": 1,
          "AIS 19": 1,
          "AIS 20": 3,
          "AIS 25": 4,
          "AIS 26": 4,
          "AIS 31": 3,
          "AIS 32": 1,
          "AIS 34": 4,
          "AIS 35": 2,
          "AIS 36": 4,
          "AIS 37": 3,
          "AIS 38": 1,
          "AIS 46": 3
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 7816": 2
        },
        "RFC": {
          "RFC 5480": 1,
          "RFC 5639": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        },
        "DES": {
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 6,
          "Infineon Technologies AG": 11
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20220613082516+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Tachograph Card\"",
      "/ModDate": "D:20220613084257+02\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-1088-2022",
      "pdf_file_size_bytes": 632204,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 29
    },
    "st_filename": "1088b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDH": {
            "ECDH": 5
          },
          "ECDSA": {
            "ECDSA": 11
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0782-V5-2020": 1,
          "BSI-DSZ-CC-1088": 2
        }
      },
      "cc_claims": {
        "O": {
          "O.RND": 1
        },
        "OE": {
          "OE.EOL": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 2,
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0091-2017": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP.4": 2,
          "ADV_IMP.1": 2,
          "ADV_TDS.3": 3
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 11,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 3,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 3,
          "ASE_OBJ.2": 3,
          "ASE_REQ.2": 3,
          "ASE_SPD.1": 3,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 11,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 11
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 15,
          "EAL4 augmented": 5,
          "EAL6": 2,
          "EAL6 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 9,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 3,
          "FAU_SAA.1": 8,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAS.1": 1
        },
        "FCO": {
          "FCO_NRO.1": 12,
          "FCO_NRO.1.1": 1,
          "FCO_NRO.1.2": 1,
          "FCO_NRO.1.3": 1
        },
        "FCS": {
          "FCS_CKM": 105,
          "FCS_CKM.1": 30,
          "FCS_CKM.2": 10,
          "FCS_CKM.4": 29,
          "FCS_COP": 79,
          "FCS_COP.1": 20,
          "FCS_RNG": 5,
          "FCS_RNG.1": 17,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 26,
          "FDP_ACC.1": 11,
          "FDP_ACC.2": 8,
          "FDP_ACF": 23,
          "FDP_ACF.1": 16,
          "FDP_DAU.1": 12,
          "FDP_DAU.1.1": 1,
          "FDP_DAU.1.2": 1,
          "FDP_ETC.1": 7,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_ETC.2": 6,
          "FDP_ETC.2.1": 1,
          "FDP_ETC.2.2": 1,
          "FDP_ETC.2.3": 1,
          "FDP_ETC.2.4": 1,
          "FDP_IFC.1": 8,
          "FDP_ITC.1": 39,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 41,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.2": 1,
          "FDP_ITC.2.3": 1,
          "FDP_ITC.2.4": 1,
          "FDP_ITC.2.5": 1,
          "FDP_ITT.1": 1,
          "FDP_RIP.1": 8,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 14,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_AFL": 23,
          "FIA_AFL.1": 8,
          "FIA_ATD": 14,
          "FIA_ATD.1": 8,
          "FIA_SOS.2": 1,
          "FIA_UAU": 20,
          "FIA_UAU.1": 14,
          "FIA_UAU.3": 12,
          "FIA_UAU.3.1": 1,
          "FIA_UAU.3.2": 1,
          "FIA_UAU.4": 8,
          "FIA_UAU.4.1": 1,
          "FIA_UID.1": 7,
          "FIA_UID.2": 10,
          "FIA_UID.2.1": 1,
          "FIA_USB": 13,
          "FIA_USB.1": 7
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 8,
          "FMT_SMF.1": 1
        },
        "FPR": {
          "FPR_UNO.1": 12
        },
        "FPT": {
          "FPT_EMS": 5,
          "FPT_EMS.1": 18,
          "FPT_EMS.1.1": 2,
          "FPT_EMS.1.2": 2,
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_ITC.1": 1,
          "FPT_PHP.3": 14,
          "FPT_PHP.3.1": 1,
          "FPT_TDC": 18,
          "FPT_TDC.1": 8,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 16,
          "FTP_ITC.1": 9,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "A.3. RSA Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU.PK (conditional, possibly multiple) VU": 1,
          "A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory 94 Key Symbol Description Purpose Type": 1,
          "A.6. ECC Generated by ERCA; inserted in card by manufacturer at the end of the manufacturing phase Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory EUR.PK (previous) (conditional; only": 1,
          "DSRC channel AES Generated by ERCA Note: Workshop and control cards may contain up to 3 KMDSRC keys Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory": 1,
          "ECC Generated by MSCA; obtained by card in MSCA_VU-EGF cer- tificate during mutual authen- tication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.4: Second-generation asymmetric": 1,
          "EUR.C as part of the EUR.Link.C; obtained by card during mutual authentication towards such a VU. Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory VU_MA.PK (conditional, possibly multiple": 1,
          "Out of scope": 11,
          "by VU or VU man- ufacturer; obtained by card in VU certificate during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MS.PK (conditional, possibly multiple": 1,
          "by VU or VU man- ufacturer; obtained by card in VU_MA certificate during mu- tual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory MSCA_VU- EGF.PK (conditional, possibly": 1,
          "foreign) MSCA; obtained by card in MS certifi- cate presented by a VU during mutual authentication Out of scope for [CC_PP-0091] Not applicable Card non- volatile memory Table A.1: First-generation asymmetric": 1,
          "inserted in card by card manufacturer. Note: See [REG_2016/799] An- nex 1C, Appendix 11, CSM_105. Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory": 1,
          "section 12.2, a workshop card may contain up to three keys KM-WC (of consecutive key generations). Out of scope for [CC_PP-0091] Made unavail- able when the card has reached end of life Card non- volatile memory": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 10
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 6
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 4,
          "brainpoolP384r1": 1,
          "brainpoolP512r1": 4
        },
        "NIST": {
          "NIST P-256": 1,
          "NIST P-384": 1,
          "NIST P-521": 1,
          "P-256": 1,
          "P-384": 1,
          "P-521": 1,
          "secp256r1": 4,
          "secp384r1": 1,
          "secp521r1": 4
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 10
          },
          "SHA2": {
            "SHA-2": 7,
            "SHA-224": 1,
            "SHA-256": 7,
            "SHA-384": 3,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 7
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 1,
          "malfunction": 1
        },
        "SCA": {
          "DPA": 1,
          "Leak-Inherent": 1,
          "SPA": 1,
          "physical probing": 5,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2
        },
        "FIPS": {
          "FIPS 180-1": 2,
          "FIPS 46-3": 1,
          "FIPS PUB 180-4": 1
        },
        "ICAO": {
          "ICAO": 2
        },
        "ISO": {
          "ISO/IEC 10116-2017": 1,
          "ISO/IEC 10373": 2,
          "ISO/IEC 19790:2012": 1,
          "ISO/IEC 7810": 2,
          "ISO/IEC 7816": 4,
          "ISO/IEC 9796-2": 1
        },
        "NIST": {
          "NIST SP 800-38B": 1,
          "NIST SP 800-67": 1,
          "NIST SP 800-90A": 1
        },
        "PKCS": {
          "PKCS #1": 1
        },
        "RFC": {
          "RFC 5480": 1,
          "RFC 5639": 1,
          "RFC 5869": 1,
          "RFC 8017": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 40
          }
        },
        "DES": {
          "3DES": {
            "3DES": 5,
            "TDEA": 1,
            "TDES": 17
          },
          "DES": {
            "DES": 6
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 10,
            "HMAC": 2,
            "KMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SSC": 3
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 4,
          "Infineon Technologies AG": 6
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "MaskTech International GmbH",
      "/CreationDate": "D:20220406102943+02\u002700\u0027",
      "/Creator": "LaTeX with hyperref",
      "/Keywords": "Common Criteria, CC, Digital Tachograph \u2013 Tachograph Card, MTCOS, EAL 4+",
      "/ModDate": "D:20220406102943+02\u002700\u0027",
      "/PTEX.Fullbanner": "This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019/Cygwin) kpathsea version 6.3.1",
      "/Producer": "pdfTeX-1.40.20",
      "/Subject": "Common Criteria Certification",
      "/Title": "MTCOS Smart Tachograph V2 / SLE78CFX4000P- Security Target lite",
      "/Trapped": "/False",
      "pdf_file_size_bytes": 487471,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 102
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0091b_pdf.pdf",
        "pp_name": "Digital Tachograph - Tachograph Card"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1088a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.2",
      "ALC_DVS.2",
      "ATE_DPT.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1088b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4c019f72119f887708ad55572366079d38178695e03bb801a748941c6a59a5ea",
      "txt_hash": "2abc57df05096772ca5877415e6912b6eab62da43ffa0d2cd392b5bfd1e31abe"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "97e00bc334faad13502bca895f4f5d0aa605613a0b663105028351cedab504b7",
      "txt_hash": "840d0f1e1211b4bc8f0553ff9d798ba83c485839d7cd10358edab9fc3233af0a"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "33394a7032ca4335ff61bd3e138e13063f36abce3cebc28487b8486f74508ad0",
      "txt_hash": "534603bc706d53f9ec1cbda9b247e73d4f7e29b1cefaec027b0ec5a52f75f086"
    }
  },
  "status": "active"
}