This page was not yet optimized for use on mobile
devices.
TC-FNMT version 5.6
CSV information
| Status | active |
|---|---|
| Valid from | 02.01.2024 |
| Valid until | 02.01.2029 |
| Scheme | 🇪🇸 ES |
| Manufacturer | FNMT-RCM |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VAN.5, EAL4+, ATE_DPT.2, ALC_DVS.2 |
| Protection profiles |
|
Heuristics summary
Certificate ID: 2018-63-INF-4217
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 2, EAL4Claims
O.E, T.ISecurity Assurance Requirements (SAR)
ALC_FLR, ALC_DVS.2, ATE_DPT.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075, BSI-CC-PP-0071, BSI-CC-PP-0072, BSI-CC-PP-0076Evaluation facilities
Applus LaboratoriesCertification report
Extracted keywords
Vendor
Idemia, Sagem, MorphoSecurity level
EAL4, EAL 1, EAL 4, EAL 2, EAL2, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_ARC, AGD_OPE.1, ALC_DVS.2, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_FLR, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS, FCS_CKM, FCS_COP, FCS_RND, FDP_ACC, FDP_ACF, FDP_DAU, FDP_IFC, FDP_IFF, FDP_ITC, FDP_RIP, FDP_SDI, FDP_UCT, FDP_UIT, FIA_AFL, FIA_API, FIA_UAU, FIA_UID, FMT_LIM, FMT_MOF, FMT_MSA, FMT_MTD, FMT_SMF, FMT_SMR.1, FMT_SMR, FPT_EMS, FPT_FLS, FPT_PHP, FPT_TST, FTP_ITCProtection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075, BSI-CC-PP-0071, BSI-CC-PP-0072, BSI-CC-PP-0076Certificates
2018-63-INF-4217- v1Evaluation facilities
Applus LaboratoriesSide-channel analysis
JILFile metadata
| Pages | 17 |
|---|
Security target
Extracted keywords
Symmetric Algorithms
AES-192, AES, DES, 3DES, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-224, SHA-256Schemes
MAC, Key AgreementProtocols
PACEElliptic Curves
P-256, P-384, P-521, NIST P-256, NIST P-384, NIST P-521, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1Block cipher modes
CBCIC data groups
EF.ChipSecurityVendor
NXP Semiconductors, Infineon Technologies AG, SagemSecurity level
EAL4, EAL4+, EAL4 augmentedClaims
A.CGA, A.SCA, A.CSP, OE.HID_VAD, OE.HI_VADSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_PRE.1, AGD_OPE.1, ALC_DVS.2, ALC_DEL.1, ALC_CMC.4, ALC_CMS.4, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.5, APE_ECD, ASE_COMP, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_GEN, FAU_SAS.1.1, FCS_RND.1, FCS_RND, FCS_CKM.1, FCS_RND.1.1, FCS_COP, FCS_CKM, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_RIP, FDP_ACF.1, FDP_ACC.1, FDP_ACC, FDP_IFC, FDP_IFF.1, FDP_IFF, FDP_IFC.1, FDP_RIP.1, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FDP_ITC, FDP_DAU, FDP_DAU.1, FDP_DAU.2, FIA_SOS.2, FIA_API.1, FIA_API, FIA_API.1.1, FIA_UAU, FIA_AFL, FIA_UID, FIA_UAU.1, FIA_AFL.1, FIA_UID.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MSA.3, FMT_MSA, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF, FMT_SMF.1, FMT_SMR, FMT_MTD.1, FMT_MTD.3, FMT_MOF, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.4, FPT_EMS.1, FPT_EMS, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST, FPT_ITC.1, FPT_ITC, FPT_FLS, FPT_FLS.1, FPT_TST.1, FPT_PHP, FPT_PHP.3, FPT_PHP.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075, BSI-CC-PP-0071, BSI-CC-PP-0072, BSI-CC-PP-0076, BSI-CC-PP-0087-V2-MA-01, BSI-CC-PP-0086, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0090-2016, BSI-CC-PP-0084-2014, BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-2013-MA-01, BSI-CC-PP-0068-V2-2011-MA-Evaluation facilities
Applus LaboratoriesSide-channel analysis
physical probing, SPA, DPA, timing attacks, physical tamperingCertification process
out of scope, the life-cycle phase operational use by a secure update mechanism. The updated TOE software is out of scope of this ST as it will be a different version of the TOE. Phase 5: End of life Step 8 The TOEStandards
FIPS 186-4, FIPS 140-2, NIST SP 800-186, NIST SP 800-90A, PKCS#1, AIS31, RFC5639, RFC 2631, RFC 3447, RFC 344776, RFC 5639, ISO/IEC 7816, ISO/IEC 11770-3, ISO/IEC 15946-1, ICAOTechnical reports
BSI TR-03110File metadata
| Pages | 158 |
|---|
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
2018-63-INF-4217Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Scheme data
| Product | TC-FNMT versión 5.6 | |
|---|---|---|
| Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/1001-tc-fnmt-version-5-6 | |
| Category | Electronic signature devicesSmart Cards and similiar devicesQSCD/SSCD | |
| Manufacturer | FNMT-RCM | |
| Certification Date | 02.01.2024 | |
| Enhanced | ||
| Description | El TOE es una tarjeta criptográfica con la capacidad de realizar firmas electrónicas. El TOE está compuesto de un chip previamente certificado (que proporciona la librerÃa criptográfica y el firmware con el loader para la actualización del código), el sistema operativo y las librerÃas biométricas. Esta tarjeta implementa un sistema de ficheros que incluye la siguiente aplicación: eSign (aplicación de firma [TR03110-2] conforme a los perfiles de protección BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075, BSI-CCPP-0071 , BSI-CC-PP-0072 Y BSI-CC-PP-0076. | |
| Category | Electronic signature devices | |
| Manufacturer | FNMT-RCM | |
| Type | Product | |
| Evaluation Facility | Applus Laboratories | |
| Status | Certified | |
| Certification Date | 02.01.2024 | |
| Cc Version | Common Criteria 3.1 release 5 | |
| Level | EAL4 + ALC_DVS.2 + ATE_DPT.2 + AVA_VAN.5 | |
| Target Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1900 | |
| Cert Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1901 | |
| Report Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1902 | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-63_Certificado.pdf",
"dgst": "cf4935ffa5cec47d",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "2018-63-INF-4217",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.6"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"1f7ea2e05de5b88b",
"d918b28fd7bb5d79",
"4a814d0e3c9f9082",
"d9553e7194783182"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Electronic signature devicesSmart Cards and similiar devicesQSCD/SSCD",
"certification_date": "2024-01-02",
"enhanced": {
"category": "Electronic signature devices",
"cc_version": "Common Criteria 3.1 release 5",
"cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1901",
"certification_date": "2024-01-02",
"description": "El TOE es una tarjeta criptogr\u00e1fica con la capacidad de realizar firmas electr\u00f3nicas. El TOE est\u00e1 compuesto de un chip previamente certificado (que proporciona la librer\u00eda criptogr\u00e1fica y el firmware con el loader para la actualizaci\u00f3n del c\u00f3digo), el sistema operativo y las librer\u00edas biom\u00e9tricas. Esta tarjeta implementa un sistema de ficheros que incluye la siguiente aplicaci\u00f3n: eSign (aplicaci\u00f3n de firma [TR03110-2] conforme a los perfiles de protecci\u00f3n BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075, BSI-CCPP-0071 , BSI-CC-PP-0072 Y BSI-CC-PP-0076.",
"evaluation_facility": "Applus Laboratories",
"level": "EAL4 + ALC_DVS.2 + ATE_DPT.2 + AVA_VAN.5",
"manufacturer": "FNMT-RCM",
"report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1902",
"status": "Certified",
"target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1900",
"type": "Product"
},
"manufacturer": "FNMT-RCM",
"product": "TC-FNMT versi\u00f3n 5.6",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/1001-tc-fnmt-version-5-6"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "FNMT-RCM",
"manufacturer_web": "https://www.fnmt.es",
"name": "TC-FNMT version 5.6",
"not_valid_after": "2029-01-02",
"not_valid_before": "2024-01-02",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "2018-63_Certificado.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.E": 1
},
"T": {
"T.I": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0071": 1,
"BSI-CC-PP-0072": 1,
"BSI-CC-PP-0075": 1,
"BSI-CC-PP-0076": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1
},
"ATE": {
"ATE_DPT.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "2018-63_INF-4217.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2018-63-INF-4217- v1": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 3,
"BSI-CC-PP-0071": 3,
"BSI-CC-PP-0072": 3,
"BSI-CC-PP-0075": 3,
"BSI-CC-PP-0076": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_IMP.1": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 8,
"ALC_FLR": 3,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.2": 8,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 9
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 1,
"EAL4": 8
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 2
},
"FCS": {
"FCS_CKM": 13,
"FCS_COP": 12,
"FCS_RND": 1
},
"FDP": {
"FDP_ACC": 6,
"FDP_ACF": 6,
"FDP_DAU": 1,
"FDP_IFC": 1,
"FDP_IFF": 1,
"FDP_ITC": 1,
"FDP_RIP": 3,
"FDP_SDI": 2,
"FDP_UCT": 2,
"FDP_UIT": 2
},
"FIA": {
"FIA_AFL": 5,
"FIA_API": 2,
"FIA_UAU": 8,
"FIA_UID": 4
},
"FMT": {
"FMT_LIM": 2,
"FMT_MOF": 1,
"FMT_MSA": 5,
"FMT_MTD": 18,
"FMT_SMF": 3,
"FMT_SMR": 2,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_EMS": 2,
"FPT_FLS": 2,
"FPT_PHP": 3,
"FPT_TST": 2
},
"FTP": {
"FTP_ITC": 7
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"Idemia": 2
},
"Morpho": {
"Morpho": 2
},
"Sagem": {
"Sagem": 5
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 364193,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "2018-63_ST_lite.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"DH": 4,
"Diffie-Hellman": 10
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CGA": 1,
"A.CSP": 1,
"A.SCA": 1
},
"OE": {
"OE.HID_VAD": 3,
"OE.HI_VAD": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0059-2009-MA-02": 1,
"BSI-CC-PP-0068-V2-2011-MA-": 1,
"BSI-CC-PP-0068-V2-2011-MA-01": 1,
"BSI-CC-PP-0071": 1,
"BSI-CC-PP-0071-2012-MA-01": 1,
"BSI-CC-PP-0072": 1,
"BSI-CC-PP-0072-2012-MA-01": 1,
"BSI-CC-PP-0075": 1,
"BSI-CC-PP-0075-2012-MA-01": 1,
"BSI-CC-PP-0076": 1,
"BSI-CC-PP-0076-2013-MA-01": 1,
"BSI-CC-PP-0084-2014": 1,
"BSI-CC-PP-0086": 2,
"BSI-CC-PP-0087-V2-MA-01": 2,
"BSI-CC-PP-0090-2016": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 5,
"ADV_FSP.4": 3,
"ADV_IMP.1": 3,
"ADV_TDS.3": 5
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 2,
"ALC_DVS.2": 7,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"APE": {
"APE_ECD": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_COMP": 2,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 8,
"ATE_FUN.1": 3,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL4": 12,
"EAL4 augmented": 1,
"EAL4+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 7,
"FAU_SAS.1": 9,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM": 49,
"FCS_CKM.1": 31,
"FCS_CKM.2": 9,
"FCS_CKM.4": 28,
"FCS_COP": 25,
"FCS_COP.1": 23,
"FCS_RND": 7,
"FCS_RND.1": 7,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC": 23,
"FDP_ACC.1": 22,
"FDP_ACF": 22,
"FDP_ACF.1": 38,
"FDP_DAU": 2,
"FDP_DAU.1": 1,
"FDP_DAU.2": 2,
"FDP_IFC": 2,
"FDP_IFC.1": 12,
"FDP_IFF": 3,
"FDP_IFF.1": 11,
"FDP_ITC": 1,
"FDP_ITC.1": 21,
"FDP_ITC.2": 19,
"FDP_RIP": 12,
"FDP_RIP.1": 4,
"FDP_SDI": 2,
"FDP_SDI.1": 2,
"FDP_SDI.2": 4,
"FDP_UCT": 5,
"FDP_UCT.1": 2,
"FDP_UIT": 2,
"FDP_UIT.1": 4
},
"FIA": {
"FIA_AFL": 13,
"FIA_AFL.1": 12,
"FIA_API": 12,
"FIA_API.1": 8,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU": 36,
"FIA_UAU.1": 15,
"FIA_UAU.4": 1,
"FIA_UAU.5": 3,
"FIA_UAU.6": 2,
"FIA_UID": 20,
"FIA_UID.1": 19
},
"FMT": {
"FMT_LIM": 13,
"FMT_LIM.1": 12,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 11,
"FMT_LIM.2.1": 1,
"FMT_MOF": 1,
"FMT_MOF.1": 1,
"FMT_MSA": 23,
"FMT_MSA.1": 4,
"FMT_MSA.2": 1,
"FMT_MSA.3": 10,
"FMT_MSA.4": 1,
"FMT_MTD": 30,
"FMT_MTD.1": 20,
"FMT_MTD.3": 2,
"FMT_SMF": 23,
"FMT_SMF.1": 24,
"FMT_SMR": 25,
"FMT_SMR.1": 31,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 10,
"FPT_EMS.1": 11,
"FPT_EMS.1.1": 2,
"FPT_EMS.1.2": 2,
"FPT_FLS": 2,
"FPT_FLS.1": 4,
"FPT_ITC": 2,
"FPT_ITC.1": 2,
"FPT_PHP": 5,
"FPT_PHP.1": 2,
"FPT_PHP.3": 3,
"FPT_TST": 6,
"FPT_TST.1": 9
},
"FTP": {
"FTP_ITC": 20,
"FTP_ITC.1": 34,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"the life-cycle phase operational use by a secure update mechanism. The updated TOE software is out of scope of this ST as it will be a different version of the TOE. Phase 5: End of life Step 8 The TOE": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 4
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 86
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 3
},
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 4,
"brainpoolP384r1": 4,
"brainpoolP512r1": 4
},
"NIST": {
"NIST P-256": 3,
"NIST P-384": 4,
"NIST P-521": 4,
"P-256": 5,
"P-384": 6,
"P-521": 6
}
},
"eval_facility": {
"Applus": {
"Applus Laboratories": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 4
}
}
},
"ic_data_group": {
"EF": {
"EF.ChipSecurity": 1
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"physical tampering": 11
},
"SCA": {
"DPA": 3,
"SPA": 3,
"physical probing": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 2
},
"FIPS": {
"FIPS 140-2": 2,
"FIPS 186-4": 2
},
"ICAO": {
"ICAO": 2
},
"ISO": {
"ISO/IEC 11770-3": 1,
"ISO/IEC 15946-1": 1,
"ISO/IEC 7816": 2
},
"NIST": {
"NIST SP 800-186": 2,
"NIST SP 800-90A": 1
},
"PKCS": {
"PKCS#1": 3
},
"RFC": {
"RFC 2631": 2,
"RFC 3447": 1,
"RFC 344776": 1,
"RFC 5639": 1,
"RFC5639": 6
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 19,
"AES-192": 1
}
},
"DES": {
"3DES": {
"3DES": 3
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 4
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies AG": 1
},
"NXP": {
"NXP Semiconductors": 1
},
"Sagem": {
"Sagem": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 1934567,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 158
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-63_INF-4217.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"ATE_DPT.2",
"EAL4+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-63_ST_lite.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "2686957761551d750b56222ebe34f6062b7a6cf61c32c9d4be4f5978f51506e4",
"txt_hash": "c8e55276642a969c496f2bec12f1e82dd62ea68f5872826f836a71ed3d6f3e70"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "67c23068c6440ab5c91a23d35b06a55d93ec3aa5600c30510102d740cf6bb1b7",
"txt_hash": "ca0ffa9723b327cd5877b9bd6376a9327ca6ae30d9c6d3c77dd29a8cadbd71be"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "37bbaad662f1d3c85377c0f8ec31dc91a29c95e8ae75d0a56221d538cb37dcc3",
"txt_hash": "f31e32485c6e5c458e800f8bc46f22e2da667b37fc6bb390d825b95d4d6b504e"
}
},
"status": "active"
}