AKIS GEZGIN_N v2.0 SAC & EAC Configuration

CSV information

Status active
Valid from 29.02.2024
Valid until 28.02.2029
Scheme 🇹🇷 TR
Manufacturer TÜBİTAK BİLGEM UEKAE
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL5+, ALC_DVS.2

Heuristics summary

Certificate ID: 21.0.03.0.00.00/TSE-CCCS-92

Certificate

Extracted keywords

Security level
EAL 5+
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Certificates
21.0.03.0.00.00/TSE-CCCS-92

Standards
ISO/IEC 15408

File metadata

Creation date D:20250605125346+03'00'
Pages 1
Creator Canon iR-ADV C5240 PDF
Producer Adobe PSL 1.2e for Canon

Certification report

Extracted keywords

Symmetric Algorithms
AES, DES
Asymmetric Algorithms
ECDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Protocols
PACE
Engines
SmartMX3

IC data groups
EF.DG3, EF.DG4
Vendor
NXP, NXP Semiconductors

Security level
EAL 5+, EAL2, EAL 6, EAL 5, EAL 4+, EAL 6 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_COMP.1, AGD_OPE, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_COMP.1, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, AVA_VAN.5, AVA_COMP.1, ASE_OBJ.2, ASE_REQ.2, ASE_TSS.1
Protection profiles
BSI-CC-PP-0084-2014, BSI-PP-0056-V2-2012
Certificates
BSI-DSZ-CC-1136-V3-2022

Side-channel analysis
physical probing, malfunction

Standards
ISO/IEC 17025, ICAO, CCMB-2017-04-004

File metadata

Creation date D:20240419163536+02'00'
Modification date D:20240503092657+03'00'
Pages 24
Creator Canon iR-ADV C5240 PDF
Producer Adobe PSL 1.2e for Canon

References

Outgoing
  • BSI-DSZ-CC-1136-V3-2022 - active - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)

Security target

Extracted keywords

Symmetric Algorithms
AES128, AES192, AES256, AES, DES, 3DES, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Protocols
PACE
Randomness
RNG
Libraries
Crypto Library 0.7.6
Elliptic Curves
brainpoolP192r1, brainpoolP224r1, brainpoolP256r1, brainpoolP320r1, brainpoolP384r1, brainpoolP512r1, brainpoolP224t1, brainpoolP256t1, brainpoolP320t1, brainpoolP384t1, brainpoolP512t1, ANSSI FRP256v1
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG16, EF.DG14, EF.DG2, EF.DG4, EF.DG3, EF.DG7, EF.DG8, EF.DG5, EF.DG6, EF.DG9, EF.DG11, EF.COM, EF.CardAccess, EF.SOD
Vendor
NXP, NXP Semiconductors

Security level
EAL 5+, EAL 6, EAL 5, EAL 6 augmented, EAL 5 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_COMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.1, AVA_VAN.5, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_RND.1, FCS_CKM.1, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_CKM.2, FCS_COP.1, FCS_CKM.4.1, FCS_RND.1.1, FCS_RNG, FDP_ACF, FDP_ACC.1, FDP_ACF.1, FDP_ACC, FDP_RIP.1, FDP_UCT, FDP_UIT, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1.1, FDP_IFC.1, FDP_UCT.1, FDP_UIT.1, FDP_ITC, FDP_ITT.1, FDP_SDC.1, FDP_SDI.2, FIA_API, FIA_API.1, FIA_SOS.2, FIA_API.1.1, FIA_AFL, FIA_UID, FIA_UAU, FIA_UAU.1, FIA_AFL.1, FIA_UID.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMF.1, FMT_SMR, FMT_MTD, FMT_MTD.3, FMT_MSA.3, FMT_SMF.1.1, FMT_SMR.1, FMT_MTD.1, FMT_MTD.3.1, FMT_MSA, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP- 0084-2014, BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0068-, BSI-CC-PP-0055
Certificates
BSI-DSZ-CC-1136-V3-2022
Evaluation facilities
TÜBİTAK BİLGEM

Side-channel analysis
physical probing, DPA, SPA, Physical Tampering, physical tampering, Malfunction, malfunction, DFA, fault injection
Certification process
out of scope, please see [ 11 ]), this algorithm is out of scope for the certification as well, please see [ 31 ] and [ 32 ]), this algorithm is out of scope for the certification as well, paper or the plastic card is achieved by physical and organizational security measures which are out of scope of this ST. The physical scope of the TOE is composed of the IC dedicated software, the IC embedded, brainpoolP384r1, and brainpoolP512r1. In addition, RSA key lengths under 1976 bits are out of scope for the certification. FCS_CKM.1/CA Cryptographic Key Generation - Diffie-Hellman for Chip, the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. FCS_CKM.4 Cryptographic Key Destruction Hierarchical to: No other components, the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. Application Note 6: The cryptographic functionality of the TOE includes hash, SHA-1. However, this algorithm is out of scope for the certification due to security considerations. The cryptographic functionality of the TOE, and the list of security mechanisms given in “ICAO Doc 9303” (please see [ 11 ]), this algorithm is out of scope for the certification as well. FCS_COP.1/SIG_GEN Cryptographic Operation - Signature generation, the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. Application Note 8: The cryptographic functionality of the TOE includes hash, considerations and BSI and SOGIS recommendations (please see [ 31 ] and [ 32 ]), this algorithm is out of scope for the certification as well. FCS_COP.1/CA_MAC Cryptographic Operation - MAC for CA protocol

Standards
FIPS 197, FIPS PUB 197, NIST SP 800-38A, PKCS #15, PKCS#3, PKCS#1, PKCS #1, PKCS #3, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-02101-2

File metadata

Author Ali YILDIRIM
Creation date D:20240219152217+03'00'
Modification date D:20240219152217+03'00'
Pages 128
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • BSI-DSZ-CC-1136-V3-2022 - active - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)

Heuristics

Certificate ID: 21.0.03.0.00.00/TSE-CCCS-92

Extracted SARs

ADV_ARC.1, ADV_COMP.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_COMP.1, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.2, ASE_OBJ.2, ASE_REQ.2, ASE_TSS.2, ATE_COMP.1, ATE_FUN.1, ATE_IND.2, AVA_COMP.1, AVA_VAN.5

Similar certificates

Name Certificate ID
Akis Gezgin_N SAC&EAC Configuration v1.0.1.0 21.0.03/TSE-CCCS-72 Compare

References

Loading...

Updates

  • 23.06.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name AKIS GEZGIN_N v2.0 SAC & EAC Configuration was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_N%20v2.0%20SAC%20\u0026%20EAC%20Certificate_Revised.pdf",
  "dgst": "c7d3bad360e2e8c6",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "21.0.03.0.00.00/TSE-CCCS-92",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-V3-2022"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021",
          "BSI-DSZ-CC-1136-V3-2022",
          "BSI-DSZ-CC-1136-V2-2022"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-V3-2022"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-V3-2022"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "T\u00dcB\u0130TAK B\u0130LGEM UEKAE",
  "manufacturer_web": "https://www.uekae.tubitak.gov.tr",
  "name": "AKIS GEZGIN_N v2.0 SAC \u0026 EAC Configuration",
  "not_valid_after": "2029-02-28",
  "not_valid_before": "2024-02-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "AKiS GEZGiN_N v2.0 SAC \u0026 EAC Certificate_Revised.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "TR": {
          "21.0.03.0.00.00/TSE-CCCS-92": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20250605125346+03\u002700\u0027",
      "/Creator": "Canon iR-ADV C5240  PDF",
      "/Producer": "Adobe PSL 1.2e for Canon\u0000",
      "pdf_file_size_bytes": 80134,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "AKiS GEZGiN_N v2.0 SAC \u0026 EAC CR_Signed.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDSA": {
            "ECDSA": 3
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V3-2022": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 2,
          "BSI-PP-0056-V2-2012": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_COMP.1": 1,
          "ADV_FSP.5": 1,
          "ADV_IMP.1": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.5": 1,
          "ALC_COMP.1": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 7,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COMP.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_COMP.1": 1,
          "AVA_VAN.5": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4+": 1,
          "EAL 5": 1,
          "EAL 5+": 4,
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX3": 1
        }
      },
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 15
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.DG3": 2,
          "EF.DG4": 2
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {
        "org": {
          "org.tr": 1
        }
      },
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1
        },
        "SCA": {
          "physical probing": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-004": 1
        },
        "ICAO": {
          "ICAO": 5
        },
        "ISO": {
          "ISO/IEC 17025": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 10,
          "NXP Semiconductors": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240419163536+02\u002700\u0027",
      "/Creator": "Canon iR-ADV C5240  PDF",
      "/ModDate": "D:20240503092657+03\u002700\u0027",
      "/Producer": "Adobe PSL 1.2e for Canon",
      "pdf_file_size_bytes": 1683333,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    },
    "st_filename": "AKiS GEZGiN_N SAC \u0026 EAC Security Target Lite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 6
          },
          "ECDH": {
            "ECDH": 11
          },
          "ECDSA": {
            "ECDSA": 21
          }
        },
        "FF": {
          "DH": {
            "DH": 11,
            "Diffie-Hellman": 14
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V3-2022": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0084-2014": 2,
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0056-V2-2012": 5,
          "BSI-CC-PP-0068-": 1,
          "BSI-CC-PP-0068-V2-2011": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_COMP.1": 5,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 8,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 6,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_DVS.2": 8,
          "ALC_FLR.1": 2
        },
        "ASE": {
          "ASE_TSS.2": 2
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 9,
          "EAL 5 augmented": 3,
          "EAL 5+": 1,
          "EAL 6": 3,
          "EAL 6 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 4,
          "FAU_SAS.1": 15,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 45,
          "FCS_CKM.1": 21,
          "FCS_CKM.2": 5,
          "FCS_CKM.4": 39,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 87,
          "FCS_COP.1": 11,
          "FCS_RND": 6,
          "FCS_RND.1": 17,
          "FCS_RND.1.1": 1,
          "FCS_RNG": 3
        },
        "FDP": {
          "FDP_ACC": 26,
          "FDP_ACC.1": 11,
          "FDP_ACF": 26,
          "FDP_ACF.1": 23,
          "FDP_IFC.1": 5,
          "FDP_ITC": 1,
          "FDP_ITC.1": 16,
          "FDP_ITC.2": 16,
          "FDP_ITT.1": 1,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1,
          "FDP_SDC.1": 1,
          "FDP_SDI.2": 1,
          "FDP_UCT": 9,
          "FDP_UCT.1": 1,
          "FDP_UIT": 9,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 14,
          "FIA_AFL.1": 4,
          "FIA_API": 5,
          "FIA_API.1": 12,
          "FIA_API.1.1": 2,
          "FIA_SOS.2": 1,
          "FIA_UAU": 65,
          "FIA_UAU.1": 6,
          "FIA_UAU.4": 1,
          "FIA_UAU.5": 2,
          "FIA_UAU.6": 2,
          "FIA_UID": 15,
          "FIA_UID.1": 6
        },
        "FMT": {
          "FMT_LIM": 6,
          "FMT_LIM.1": 23,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 22,
          "FMT_LIM.2.1": 2,
          "FMT_MSA": 2,
          "FMT_MSA.3": 6,
          "FMT_MTD": 90,
          "FMT_MTD.1": 13,
          "FMT_MTD.3": 10,
          "FMT_MTD.3.1": 1,
          "FMT_SMF.1": 46,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 23,
          "FMT_SMR.1": 24
        },
        "FPT": {
          "FPT_EMS": 3,
          "FPT_EMS.1": 19,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 13,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 16,
          "FPT_PHP.3.1": 1,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 13,
          "FTP_ITC.1": 7,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "SHA-1. However, this algorithm is out of scope for the certification due to security considerations. The cryptographic functionality of the TOE": 2,
          "and the list of security mechanisms given in \u201cICAO Doc 9303\u201d (please see [ 11 ]), this algorithm is out of scope for the certification as well. FCS_COP.1/SIG_GEN Cryptographic Operation - Signature generation": 1,
          "brainpoolP384r1, and brainpoolP512r1. In addition, RSA key lengths under 1976 bits are out of scope for the certification. FCS_CKM.1/CA Cryptographic Key Generation - Diffie-Hellman for Chip": 1,
          "considerations and BSI and SOGIS recommendations (please see [ 31 ] and [ 32 ]), this algorithm is out of scope for the certification as well. FCS_COP.1/CA_MAC Cryptographic Operation - MAC for CA protocol": 1,
          "out of scope": 9,
          "paper or the plastic card is achieved by physical and organizational security measures which are out of scope of this ST. The physical scope of the TOE is composed of the IC dedicated software, the IC embedded": 1,
          "please see [ 11 ]), this algorithm is out of scope for the certification as well": 1,
          "please see [ 31 ] and [ 32 ]), this algorithm is out of scope for the certification as well": 1,
          "the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. Application Note 6: The cryptographic functionality of the TOE includes hash": 1,
          "the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. Application Note 8: The cryptographic functionality of the TOE includes hash": 1,
          "the TOE covers only these elliptic curves as well. In addition, RSA key lengths under 1976 bits are out of scope for the certification. FCS_CKM.4 Cryptographic Key Destruction Hierarchical to: No other components": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library 0.7.6": 1
        }
      },
      "crypto_protocol": {
        "PACE": {
          "PACE": 105
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {
        "ANSSI": {
          "ANSSI FRP256v1": 3
        },
        "Brainpool": {
          "brainpoolP192r1": 1,
          "brainpoolP224r1": 4,
          "brainpoolP224t1": 3,
          "brainpoolP256r1": 5,
          "brainpoolP256t1": 3,
          "brainpoolP320r1": 4,
          "brainpoolP320t1": 3,
          "brainpoolP384r1": 5,
          "brainpoolP384t1": 3,
          "brainpoolP512r1": 5,
          "brainpoolP512t1": 3
        }
      },
      "eval_facility": {
        "TUBITAK-BILGEM": {
          "T\u00dcB\u0130TAK B\u0130LGEM": 128
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-224": 4,
            "SHA-256": 5,
            "SHA-384": 4,
            "SHA-512": 5
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 5,
          "EF.CardAccess": 3,
          "EF.DG1": 15,
          "EF.DG11": 1,
          "EF.DG14": 17,
          "EF.DG16": 9,
          "EF.DG2": 2,
          "EF.DG3": 12,
          "EF.DG4": 13,
          "EF.DG5": 1,
          "EF.DG6": 1,
          "EF.DG7": 12,
          "EF.DG8": 12,
          "EF.DG9": 1,
          "EF.SOD": 6
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 7
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Malfunction": 4,
          "Physical Tampering": 4,
          "fault injection": 1,
          "malfunction": 5,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 3
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 197": 1,
          "FIPS PUB 197": 1
        },
        "ICAO": {
          "ICAO": 8
        },
        "NIST": {
          "NIST SP 800-38A": 1
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS #15": 1,
          "PKCS #3": 1,
          "PKCS#1": 1,
          "PKCS#3": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 14,
            "AES128": 1,
            "AES192": 1,
            "AES256": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 6
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 8,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-02101-2": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 6,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Ali YILDIRIM",
      "/CreationDate": "D:20240219152217+03\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20240219152217+03\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "pdf_file_size_bytes": 2020528,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 128
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_N%20v2.0%20SAC%20\u0026%20EAC%20CR_Signed.pdf",
  "scheme": "TR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_VAN.5",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_N%20SAC%20\u0026%20EAC%20Security%20Target%20Lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7eae6f63df5db38c21a29464b9990f8ffb94d8ea2bb3baa945ce957fff25a23f",
      "txt_hash": "8398fd2381f97b8f347d99e4912ba697e87a5347fb6d522b536e0970fcfe0b7a"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "15bedab46fea7a014618184cfb0a2a511df27d06bcc32cb7f2807d7d0a0ed54b",
      "txt_hash": "0ba078942b0d76804041786aa1fa873b7dd3ff3056ce659da4b130efd2eb6925"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "34e4e2144b601af3c8596b725ee9e90e4005ce8e7d02966fee5bfcbb6c8c63f2",
      "txt_hash": "f6e22fa5967648a3c4cf8be78c37d3d198d1178239aa58aa5abacd0e47c1d905"
    }
  },
  "status": "active"
}