name |
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series |
PWPW SmartApp-MRTD 1.0 |
category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
TR |
DE |
status |
archived |
active |
not_valid_after |
27.03.2017 |
22.05.2028 |
not_valid_before |
15.03.2013 |
22.05.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1176c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20CERTIFICATION%20REPORT.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1176a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20ST-%20v0.9.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1176b_pdf.pdf |
manufacturer |
RIOREY Incorporated |
Polska Wytwórnia Papierów Wartościowych S.A. |
manufacturer_web |
https://www.riorey.com/ |
https://www.pwpw.pl |
security_level |
EAL4+, ALC_FLR.1 |
ALC_DVS.2, EAL4+, ATE_DPT.2, AVA_VAN.5 |
dgst |
53265b9d283d6074 |
3c8ae60e2a9985db |
heuristics/cert_id |
|
BSI-DSZ-CC-1176-2023 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ALC_FLR.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V5-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
|
- category: Electronic ID documents
- cert_id: BSI-DSZ-CC-1176-2023
- certification_date: 22.05.2023
- enhanced:
- applicant: Polska Wytwórnia Papierów Wartościowych S.A. 1 Sanguszki St. 00-222 Warsaw Poland
- assurance_level: EAL4+,ATE_DPT.2,ALC_DVS.2,AVA_VAN.5
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1176c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 22.05.2023
- description: The composite TOE is named PWPW SmartApp-MRTD and was evaluated in version 1.0. The TOE is an electronic travel document representing a contactless smart card.
- entries: [frozendict({'id': 'Machine', 'description': 'Extended Access Control'}), frozendict({'id': 'Common', 'description': 'Protection Profile'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 21.05.2028
- product: PWPW SmartApp-MRTD 1.0
- protection_profile: Machine Readable Travel Document with "ICAO Application", Extended Access Control with PACE (EAC PP), Version 1.3.2, 5 December 2012, BSI-CC-PP-0056-V2-2012-MA-02,Common Criteria Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP), Version 1.01, 22 July 2014, BSI-CC-PP-0068-V2-2011-MA-01
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1176a_pdf.pdf?__blob=publicationFile&v=3
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1176b_pdf.pdf?__blob=publicationFile&v=3
- product: PWPW SmartApp-MRTD 1.0
- subcategory: IC with applications
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-IC_mit_Anwendung/1176.html
- vendor: Polska Wytwórnia Papierów Wartościowych S.A.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V5-2022 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V5-2022 |
heuristics/protection_profiles |
{} |
a33327d40f253f46, b380aabf93b29692 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename |
|
1176c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ICAO:
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: Common Criteria, Certification, Zertifizierung
- /Subject: Common Criteria, Certification, Zertifizierung
- /Title: Certificate BSI-DSZ-CC-1176-2023
- pdf_file_size_bytes: 231433
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
RioRey CERTIFICATION REPORT.pdf |
1176a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ATE_DPT.2, ALC_DVS.2 and AVA_VAN.5
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1176-2023
- cert_item: PWPW SmartApp-MRTD 1.0
- cert_lab: BSI
- developer: Polska Wytwórnia Papierów Wartościowych S.A
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Machine Readable Travel Document with "ICAO Application", Extended Access Control with PACE (EAC PP), Version 1.3.2, 5 December 2012, BSI- CC-PP-0056-V2-2012-MA-02, Common Criteria Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP), Version 1.01, 22 July 2014, BSI-CC-PP-0068-V2- 2011-MA-01
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-V5-2022: 1
- BSI-DSZ-CC-1110-V5-2022-MA-01: 2
- BSI-DSZ-CC-1176: 1
- BSI-DSZ-CC-1176-2023: 14
- BSI-DSZ-CC-S-0168-2021-MA-01: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0056-: 2
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 2
- EAL 4+: 5
- EAL4: 1
- EAL4+: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.1: 8
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_DPT.2: 4
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.BACKUP: 1
- A.CONNECT: 1
- A.NOEVIL: 1
- A.PHYSICAL: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 11
- Infineon Technologies AG: 3
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- ISO:
|
- BSI:
- AIS 20: 3
- AIS 25: 3
- AIS 26: 4
- AIS 31: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 2
- AIS 36: 5
- AIS 37: 2
- AIS 46: 2
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- BSI-DSZ-CC-1176-2023: “PWPW SmartApp-MRTD 1.0 Security Target”, Version 1.0.14.0, 2023-03-09, PWPW (confidential document) Security Target Lite “PWPW SmartApp-MRTD 1.0 Security Target Lite”, Version 1.0.3.0, 2023-03-09: 1
- Date 2023-03-21, Evaluation Technical Report Summary BSI-DSZ-CC-1176, TÜV Informationstechnik GmbH (confidential document) [8] Machine Readable Travel Document with "ICAO Application", Extended Access Control with PACE: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: Tse
- /CreationDate: D:20130318153433-04'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20130318153433-04'00'
- /Producer: Microsoft® Word 2010
- /Title: 1
- pdf_file_size_bytes: 511380
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung"
- /Subject: Common Criteria, Certification, Zertifizierung
- /Title: Certification Report BSI-DSZ-CC-1176-2023
- pdf_file_size_bytes: 447732
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
pdf_data/st_filename |
RioRey ST- v0.9.pdf |
1176b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-V5-2022: 5
- BSI-DSZ-CC-1176: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0055: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL 6+: 3
- EAL4: 1
- EAL4 augmented: 1
- EAL6: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.1: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.2: 4
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 4
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 5
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_UAU_EXT.2: 1
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU: 3
- FIA_UAU.1: 2
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU_EXT.2: 13
- FIA_UAU_EXT.2.1: 3
- FIA_UID: 1
- FIA_UID.1: 8
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MTD.1: 14
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_STM.1: 2
- FRU:
- FRU_DDOS: 2
- FRU_DDOS_EXT.1: 12
- FRU_DDOS_EXT.1.1: 3
- FRU_DDOS_EXT.1.2: 3
- FRU_DDOS_EXT.1.3: 3
|
- FAU:
- FAU_SAS.1: 7
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 48
- FCS_CKM.1: 5
- FCS_CKM.4: 7
- FCS_CKM.4.1: 1
- FCS_COP: 68
- FCS_COP.1: 5
- FCS_RND.1: 7
- FCS_RND.1.1: 1
- FCS_RNG: 2
- FCS_RNG.1: 1
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 3
- FDP_ACF: 7
- FDP_ACF.1: 13
- FDP_RIP: 1
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FDP_SDC.1: 2
- FDP_SDI.2: 2
- FDP_UCT: 7
- FDP_UCT.1: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_ACC.1.1: 1
- FIA_AFL: 5
- FIA_AFL.1: 2
- FIA_API: 1
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_UAU: 34
- FIA_UAU.1: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 4
- FIA_UAU.6: 2
- FIA_UID: 4
- FIA_UID.1: 2
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 10
- FMT_LIM.1.1: 2
- FMT_LIM.2: 10
- FMT_LIM.2.1: 3
- FMT_MTD: 30
- FMT_MTD.1: 9
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_SMF.1: 2
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 3
- FPT:
- FPT_EMS: 1
- FPT_EMS.1: 3
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP.3: 2
- FPT_PHP.3.1: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FPT_TST.2: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.BACKUP: 3
- A.CONNECT: 3
- A.NOEVIL: 3
- A.PHYSICAL: 3
- O:
- O.AUDIT: 10
- O.DDOSALERT: 5
- O.DDOSMITIGATE: 6
- O.FAILSAFE: 6
- O.IDAUTH: 9
- O.MANAGE: 8
- O.PROCOM: 6
- OE:
- OE.AUDIT: 4
- OE.BACKUP: 3
- OE.CONNECT: 3
- OE.NOEVIL: 3
- OE.PHYSICAL: 3
- OE.TIME: 5
- T:
- T.AUDIT: 4
- T.DDOSATTACK: 3
- T.FAILURE: 3
- T.MANAGE: 3
- T.NOAUTH: 3
- T.PROCOM: 3
|
- O:
- O.AES: 2
- O.RND: 2
- O.TDES: 2
- T:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 6
- Infineon Technologies: 1
|
pdf_data/st_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 1
- TÜViT: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 19
- TDEA: 1
- TDES: 2
- Triple-DES: 14
- DES:
- constructions:
- MAC:
- CBC-MAC: 8
- CMAC: 9
- KMAC: 2
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 7
- SHA-256: 10
- SHA-384: 5
- SHA-512: 5
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-224: 2
- NIST P-256: 2
- NIST P-384: 2
- NIST P-521: 2
- P-224: 2
- P-256: 2
- P-384: 2
- P-521: 2
- secp224r1: 2
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 9
- Physical tampering: 2
- fault injection: 1
- malfunction: 2
- SCA:
- DPA: 1
- Leak-Inherent: 4
- physical probing: 3
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 1
- EF.DG1: 4
- EF.DG14: 2
- EF.DG16: 2
- EF.DG2: 4
- EF.DG3: 5
- EF.DG4: 5
- EF.DG5: 2
- EF.SOD: 5
|
pdf_data/st_keywords/standard_id |
- RFC:
- RFC 1858: 2
- RFC 1918: 1
- RFC1858: 1
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS180-4: 6
- FIPS186-4: 12
- FIPS197: 4
- FIPS46-3: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- ISO/IEC 7816-2: 2
- ISO/IEC 9797-1: 2
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope: 1
- software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
|
|
pdf_data/st_metadata |
- /CreationDate: D:20130328162641+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20130328162641+02'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 1068348
- pdf_hyperlinks: https://tools.ietf.org/html/rfc6151
- pdf_is_encrypted: False
- pdf_number_of_pages: 62
|
- /Author: Krzysztof Janowski
- /Keywords: MRTD, Machine Readable Travel Document, e-Passport, Residence Permit
- /Subject: Security Target Lite
- /Title: PWPW SmartApp-MRTD 1.0
- pdf_file_size_bytes: 1311623
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 86
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |