name |
Alteon version 32.6.3.50 |
MTCOS Pro 2.5 EAC with PACE / P71D352 (N7121) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
DE |
status |
active |
active |
not_valid_after |
03.05.2028 |
22.02.2028 |
not_valid_before |
03.05.2023 |
22.02.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42_Certificado.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1147V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42-INF-4015.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1147V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-42_ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1147V2b_pdf.pdf |
manufacturer |
Radware, LTD. |
MaskTech International GmbH |
manufacturer_web |
https://www.radware.com/products/alteon/ |
https://www.masktech.de/ |
security_level |
EAL2 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
69b82608a6c3aa9c |
06d5ee81a5b6b59c |
heuristics/cert_id |
2021-42-INF-4015 |
BSI-DSZ-CC-1147-V2-2023 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ASE_TSS.2, ADV_TDS.4, ASE_REQ.2, ALC_COMP.1, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
32.6.3.50 |
2.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1148-V2-2023, BSI-DSZ-CC-1147-V3-2023 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-1040-2019, BSI-DSZ-CC-1147-2020 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1148-V3-2023, BSI-DSZ-CC-1148-V2-2023, BSI-DSZ-CC-1147-V3-2023 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-2021, BSI-DSZ-CC-1040-2019, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0996-2018, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1034-2019, BSI-DSZ-CC-1147-2020, BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0995-2018 |
heuristics/scheme_data |
- category: Others
- certification_date: 03.05.2023
- enhanced:
- category: Others
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1741
- certification_date: 03.05.2023
- description: The TOE is the Alteon version 32.6.3.50 series of products, with the TSF covering the core load balancing capabilities together with the SSL Offloading and part of the management capabilities. The TOE, thus, acts as a load balancer which redirects service request in a balanced way to multiple providing servers. As such, from hence forward the TOE may be referred as an ADC or as a load balancer interchangeably. Additionally, the TOE provides the following major security features: security audit, cryptographic support, user data protection, identification and authentication, security management, protection of the TSF, TOE access and trusted path/channel.
- evaluation_facility: Applus Laboratories
- level: EAL2
- manufacturer: RADWARE, LTD.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1742
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1740
- type: Product
- manufacturer: RADWARE, LTD.
- product: Alteon version 32.6.3.50
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/982-alteon-version-32-6-3-50
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
a33327d40f253f46 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename |
2021-42_Certificado.pdf |
1147V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1147-V2-2023: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
- EAL:
- EAL 2: 1
- EAL 5: 2
- EAL 5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ICAO:
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 892166
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: Common Criteria, Certification, Zertifizierung, MTCOS Pro 2.5 EAC with PACE / P71D352 (N7121), MaskTech International GmbH
- /Subject: Common Criteria, Certification, Zertifizierung, MTCOS Pro 2.5 EAC with PACE / P71D352 (N7121), MaskTech International GmbH
- /Title: Certificate BSI-DSZ-CC-1147-V2-2023
- pdf_file_size_bytes: 228568
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
2021-42-INF-4015.pdf |
1147V2a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1147-V2-2023
- cert_item: MTCOS Pro 2.5 EAC with PACE / P71D352 (N7121
- cert_lab: BSI
- developer: MaskTech International GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Machine Readable Travel Document with "ICAO Application" Extended Access Control with PACE, Version 1.3.2, 5 December 2012, BSI-CC-PP-0056- V2-2012-MA-02
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1040-2019: 1
- BSI-DSZ-CC-1136-V3-2022: 7
- BSI-DSZ-CC-1147-2020: 3
- BSI-DSZ-CC-1147-V2-2023: 17
- BSI-DSZ-CC-S-0183-2021: 1
- BSI-DSZ-CC-S-0189-2021: 1
- BSI-DSZ-CC-S-0207-: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-: 1
- BSI-CC-PP-0056-V2-2012-: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 2
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0068-V2-2011-MA01: 1
- BSI-CC-PP-0084-2014: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 9
- EAL 4: 2
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL 5: 8
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 4
- EAL6 augmented: 3
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 2
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 1
- ALC_FLR.1: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_STG.1: 1
- FCS:
- FCS_CKM.2: 1
- FCS_HTS.1: 1
- FCS_TLS: 1
- FCS_TLS.2: 1
- FDP:
- FIA:
- FIA_AFL.1: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FPT:
- FTA:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 5
- NXP Semiconductors: 9
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
- TLS:
- SSL:
- TLS:
- TLS: 1
- TLS1.2: 1
- TLS1.3: 2
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 14: 1
- AIS 19: 1
- AIS 20: 3
- AIS 25: 4
- AIS 26: 4
- AIS 31: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 2
- AIS 36: 4
- AIS 37: 3
- AIS 38: 1
- AIS 46: 3
- AIS 47: 1
- AIS36: 1
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Access Control, MTCOS Pro 2.5 EAC with PACE / P71D352 (N7121), MaskTech International GmbH (confidential document) [7] Security Target Lite BSI-DSZ-CC-1147-V2-2023, Version 1.3, 13 January 2023, Machine Readable: 1
- Configuration List for MTCOS Pro 2.5 ePassport / P71D352 (N7121), MaskTech International GmbH (confidential document) [13] ICAO. Technical Report: Supplemental Access Control for Machine Readable Travel Documents. V1: 1
- MTCOS Pro 2.5 EAC with PACE / P71D352 (N7121), SRC Security Research & Consulting GmbH (confidential document) [9] Common Criteria Protection Profile - Electronic Passport using Standard Inspection Procedure: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: Common Criteria, Certification, Zertifizierung, MTCOS Pro 2.5 EAC with PACE / P71D352 (N7121), MaskTech International GmbH
- /Subject: Common Criteria, Certification, Zertifizierung, MTCOS Pro 2.5 EAC with PACE / P71D352 (N7121), MaskTech International GmbH
- /Title: Certification Report BSI-DSZ-CC-1147-V2-2023
- pdf_file_size_bytes: 439600
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
pdf_data/st_filename |
2021-42_ST.pdf |
1147V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1147-: 1
- BSI-DSZ-CC-S-0183-2021: 1
- BSI-DSZ-CC-S-0189-2021: 1
- BSI-DSZ-CC-S-0207-2021: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP-0056-: 1
- BSI-CC-PP-0056-V2-2011: 1
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL4+: 1
- EAL5: 12
- EAL5 augmented: 4
- EAL5+: 1
- EAL6: 2
- EAL6 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 2
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 2
- AVA:
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.2: 7
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 3
- ASE_SPD.1: 3
- ASE_TSS.1: 2
- ASE_TSS.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 2
- ATE_DPT.3: 2
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 7
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_STG: 2
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 6
- FCS_CKM.1: 6
- FCS_CKM.2: 7
- FCS_CKM.2.1: 1
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_COP: 4
- FCS_HTS: 4
- FCS_HTS.1: 10
- FCS_HTS.1.1: 2
- FCS_HTS.1.2: 2
- FCS_TLS: 20
- FCS_TLS.1: 8
- FCS_TLS.1.1: 3
- FCS_TLS.1.2: 3
- FCS_TLS.1.3: 3
- FCS_TLS.2: 7
- FCS_TLS.2.1: 2
- FCS_TLS.2.2: 2
- FCS_TLS.2.3: 2
- FDP:
- FDP_ACC.1: 1
- FDP_IFC: 1
- FDP_IFC.1: 10
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_UAU: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 6
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 7
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 5
- FMT_SMR.2: 9
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL: 2
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 6
- FTA_SSL.4.1: 1
- FTP:
- FTP_ITC: 5
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 3
- FTP_TRP.1: 12
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_SAS.1: 9
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 58
- FCS_CKM.1: 18
- FCS_CKM.2: 6
- FCS_CKM.4: 39
- FCS_CKM.4.1: 1
- FCS_COP: 81
- FCS_COP.1: 11
- FCS_RND.1: 18
- FCS_RND.1.1: 1
- FCS_RND.1.2: 1
- FCS_RNG: 3
- FCS_RNG.1: 3
- FDP:
- FDP_ACC: 17
- FDP_ACC.1: 8
- FDP_ACF: 15
- FDP_ACF.1: 15
- FDP_IFC.1: 5
- FDP_ITC: 1
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_ITT.1: 1
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_SDC.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 12
- FDP_UCT.1: 2
- FDP_UIT: 12
- FDP_UIT.1: 3
- FIA:
- FIA_ACC.1.1: 1
- FIA_AFL: 8
- FIA_AFL.1: 2
- FIA_API: 9
- FIA_API.1: 11
- FIA_API.1.1: 1
- FIA_UAU: 73
- FIA_UAU.1: 5
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 6
- FIA_UAU.6: 3
- FIA_UID: 15
- FIA_UID.1: 7
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 15
- FMT_LIM.1.1: 1
- FMT_LIM.2: 12
- FMT_LIM.2.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 1
- FMT_MSA.3: 3
- FMT_MTD: 85
- FMT_MTD.1: 14
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 51
- FMT_SMF.1.1: 1
- FMT_SMR: 25
- FMT_SMR.1: 13
- FPT:
- FPT_EMS.1: 13
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 3
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 15
- FTP_ITC.1: 7
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.LIMITED_FUNCTIONALITY: 2
- A.MANAGEMENT_SEPARATION: 2
- A.NO_EVIL: 3
- A.PHYSICAL_PROTECTION: 3
- O:
- O.ACCESS: 9
- O.ADMINISTRATION: 7
- O.AUDIT: 11
- O.TRAFFIC_FLOW: 9
- O.TRUSTED_CHANNELS: 8
- OE:
- OE.NO_GENERAL_PURPOSE: 4
- OE.PHYSICAL_SECURITY: 5
- OE.TRUESTED_ADMINS: 1
- OE.TRUSTED_ADMINS: 5
- OSP:
- OSP.ACCOUNTABILITY: 3
- OSP.LOGS: 2
- OSP.ROLES: 3
- OSP.TRUSTED_ADMINISTRATORS: 2
- T:
- T.PASSWORD_CRACKING: 4
- T.UNBALANCED_LOAD: 3
- T.UNDETECTED_ACTIVITIES: 2
- T.WEAK_CRYPTOGRAPHY: 3
- T.WEAK_ENDPOINTS: 2
|
- O:
- O.AES: 1
- O.ECC: 1
- O.PUF: 1
- O.RND: 1
- O.RSA: 1
- O.SHA: 1
- O.TDES: 1
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 1
- NXP Semiconductors: 9
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 12
- TDEA: 1
- TDES: 4
- Triple-DES: 5
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 5
- SHA-384: 4
- SHA-512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- SSL: 16
- SSL 2.0: 5
- SSL 3.0: 5
- TLS:
- TLS: 47
- TLS 1.0: 5
- TLS 1.1: 5
- TLS 1.2: 7
- TLS 1.3: 10
- TLS1.2: 1
- TLS1.3: 3
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- secp256r1: 3
- secp384r1: 3
- secp521r1: 3
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 4
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 4
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
- TLS_RSA_WITH_AES_128_CBC_SHA256: 4
- TLS_RSA_WITH_AES_128_GCM_SHA256: 4
- TLS_RSA_WITH_AES_256_GCM_SHA384: 4
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 5
- Physical tampering: 3
- fault injection: 1
- malfunction: 6
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 1
- physical probing: 4
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 3
- EF.DG1: 10
- EF.DG13: 1
- EF.DG14: 5
- EF.DG15: 2
- EF.DG16: 9
- EF.DG2: 4
- EF.DG3: 13
- EF.DG4: 13
- EF.DG5: 3
- EF.SOD: 5
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- RFC:
- RFC 2818: 2
- RFC 4253: 1
- RFC 5246: 20
- RFC 5288: 16
- RFC 5289: 32
- RFC 8446: 24
- RFC2818: 1
- RFC3164: 4
- RFC5246: 2
- RFC5288: 1
- RFC5289: 1
- RFC5424: 4
- RFC8446: 5
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 140-3: 2
- FIPS 180-4: 1
- FIPS PUB 140-3: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- ICAO:
- ISO:
- ISO/IEC 10116-2017: 1
- ISO/IEC 14443: 2
- ISO/IEC 7816: 4
- ISO/IEC 7816-4: 1
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-56A: 1
- NIST SP 800-67: 1
- NIST SP 800-90A: 1
- RFC:
- RFC 2631: 1
- RFC 3369: 1
- RFC 8017: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: MaskTech International GmbH
- /Keywords: Common Criteria, CC, Machine Readable Travel Document, MRTD, EAC with PACE, ePass, MTCOS, EAL 5+
- /Subject: Common Criteria Certification
- /Title: MTCOS Pro 2.5 ICAO - EAC with PACE / P71D352 (N7121)- Security Target lite
- pdf_file_size_bytes: 672115
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 109
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |