Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
AhnLab MDS, MDS with MTA, and MDS Manager v2.1
383-4-481
Ideal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration)
NSCIB-CC-195748-CR
name AhnLab MDS, MDS with MTA, and MDS Manager v2.1 Ideal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration)
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA NL
not_valid_after 29.10.2024 19.11.2023
not_valid_before 29.10.2019 19.11.2018
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-481%20CT%20no%20sig%20Eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-195748.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-481%20CR%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-195748-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-481%20AhnLab%20MDS%20Security%20Target_1.4.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-EAC-Lite]%202018_2000037744%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(SAC%20EAC%20Polymorphic)%20(v1.0,%202018-09-07).pdf
manufacturer AhnLab, Inc. Idemia
manufacturer_web https://www.ahnlab.com/ https://www.idemia.com
security_level {} ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 90969e38fd9b581f 8385fe63bf12b96b
heuristics/cert_id 383-4-481 NSCIB-CC-195748-CR
heuristics/cert_lab []
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ASE_CCL.1
heuristics/extracted_versions 2.1 2.3
heuristics/report_references/directly_referenced_by {} NSCIB-CC-196231-CR
heuristics/report_references/directly_referencing {} ANSSI-CC-2018/27
heuristics/report_references/indirectly_referenced_by {} NSCIB-CC-196231-CR
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0782-2012, ANSSI-CC-2016/66, BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2017/59, ANSSI-CC-2018/27, BSI-DSZ-CC-0782-V2-2015
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27
heuristics/protection_profiles {} a33327d40f253f46, b380aabf93b29692
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf
pdf_data/cert_filename 383-4-481 CT no sig Eng.pdf Signed certificate CC-18-195748.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 383-4-481: 1
  • NL:
    • CC-18-195748: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0068-V2-2011-: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/eval_facility
  • Lightship:
    • Lightship Security: 1
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/crypto_protocol
  • PACE:
    • PACE: 2
pdf_data/cert_keywords/standard_id
  • ICAO:
    • ICAO: 1
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20191104105116-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1640406
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20181119163349+01'00'
  • /Creator: BHC364e
  • /ModDate: D:20181119163349+01'00'
  • /Producer: KONICA MINOLTA bizhub C364e
  • /Title: BHC364e-20181119163349
  • pdf_file_size_bytes: 220310
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 383-4-481 CR v1.0.pdf Certification Report NSCIB-CC-195748-CR.pdf
pdf_data/report_frontpage
  • NL:
  • CA:
  • NL:
    • cert_id: NSCIB-CC-195748-CR
    • cert_item: IDeal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration
    • cert_lab: Brightsight
    • developer: IDEMIA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-481: 1
  • FR:
    • ANSSI-CC-2018/27: 1
  • NL:
    • CC-19-180351: 1
    • NSCIB-CC-195748-CR: 12
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012: 1
    • BSI-CC-PP-0068-V2: 1
    • BSI-CC-PP-0068-V2-MA-01: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL4: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 2
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 7
  • Infineon:
    • Infineon: 3
pdf_data/report_keywords/eval_facility
  • Lightship:
    • Lightship Security: 1
  • BrightSight:
    • Brightsight: 2
  • CESTI:
    • CESTI: 1
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC-SHA-256: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA2:
      • SHA-2: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 6
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 4
pdf_data/report_keywords/vulnerability
  • ROCA:
    • ROCA: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • ICAO:
    • ICAO: 6
  • ISO:
    • ISO/IEC 18013: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. Page: 9/13 of report number: NSCIB-CC-195748-CR: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: p646
  • /CreationDate: D:20181120152710+01'00'
  • /Creator: PDFCreator Version 1.2.0
  • /Keywords:
  • /ModDate: D:20181120152710+01'00'
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: Certification Report NSCIB-CC-195748-CR
  • pdf_file_size_bytes: 640598
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename 383-4-481 AhnLab MDS Security Target_1.4.pdf [ST-EAC-Lite] 2018_2000037744 - Security Target Lite IDeal Pass v2.3-i JC (SAC EAC Polymorphic) (v1.0, 2018-09-07).pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-V4-2018: 1
  • FR:
    • ANSSI-CC-2018/27: 2
  • NL:
    • CC-1: 6
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055-2009: 1
    • BSI-CC-PP-0056-V2-2012: 2
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0068-V2: 2
    • BSI-CC-PP-0068-V2-: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-CC-PP-0068-V2-2011-MA-01: 2
    • BSI-CC-PP-0086: 1
    • BSI-PP-0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5+: 1
    • EAL5: 7
    • EAL5 augmented: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE: 4
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 2
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 8
    • ADV_IMP.1: 8
    • ADV_INT.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE: 11
    • AGD_OPE.1: 5
    • AGD_PRE: 10
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 9
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 21
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_GEN_EXT: 1
    • FAU_GEN_EXT.1: 9
    • FAU_GEN_EXT.1.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 10
    • FAU_STG_EXT.1.1: 4
    • FAU_STG_EXT.1.2: 2
    • FAU_STG_EXT.1.3: 4
    • FAU_STG_EXT.2: 5
    • FAU_STG_EXT.2.1: 1
    • FAU_STG_EXT.3: 7
    • FAU_STG_EXT.3.1: 1
    • FAU_STG_EXT.4: 5
    • FAU_STG_EXT.4.1: 1
  • FCO:
    • FCO_CPC_EXT: 1
    • FCO_CPC_EXT.1: 10
    • FCO_CPC_EXT.1.1: 3
    • FCO_CPC_EXT.1.2: 3
    • FCO_CPC_EXT.1.3: 2
  • FCS:
    • FCS_CKM: 6
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 22
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP: 74
    • FCS_COP.1: 7
    • FCS_DTLS_EXT.1.1: 1
    • FCS_DTLS_EXT.2.1: 1
    • FCS_NTP_EXT: 1
    • FCS_NTP_EXT.1: 6
    • FCS_NTP_EXT.1.1: 1
    • FCS_NTP_EXT.1.2: 1
    • FCS_NTP_EXT.1.3: 1
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT: 1
    • FCS_RBG_EXT.1: 22
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 4
    • FCS_SSHC_EXT: 1
    • FCS_SSHC_EXT.1: 10
    • FCS_SSHC_EXT.1.1: 2
    • FCS_SSHC_EXT.1.2: 2
    • FCS_SSHC_EXT.1.3: 2
    • FCS_SSHC_EXT.1.4: 2
    • FCS_SSHC_EXT.1.5: 4
    • FCS_SSHC_EXT.1.6: 2
    • FCS_SSHC_EXT.1.7: 2
    • FCS_SSHC_EXT.1.8: 2
    • FCS_SSHC_EXT.1.9: 2
    • FCS_SSHS_EXT: 1
    • FCS_SSHS_EXT.1: 10
    • FCS_SSHS_EXT.1.1: 2
    • FCS_SSHS_EXT.1.2: 2
    • FCS_SSHS_EXT.1.3: 2
    • FCS_SSHS_EXT.1.4: 2
    • FCS_SSHS_EXT.1.5: 3
    • FCS_SSHS_EXT.1.6: 2
    • FCS_SSHS_EXT.1.7: 2
    • FCS_SSHS_EXT.1.8: 2
    • FCS_TLSC: 2
    • FCS_TLSC_EXT: 2
    • FCS_TLSC_EXT.1: 7
    • FCS_TLSC_EXT.1.1: 4
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2: 5
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.2.2: 1
    • FCS_TLSC_EXT.2.3: 1
    • FCS_TLSC_EXT.2.4: 1
    • FCS_TLSC_EXT.2.5: 1
    • FCS_TLSS_EXT: 3
    • FCS_TLSS_EXT.1: 11
    • FCS_TLSS_EXT.1.1: 5
    • FCS_TLSS_EXT.1.2: 2
    • FCS_TLSS_EXT.1.3: 2
    • FCS_TLSS_EXT.2: 5
    • FCS_TLSS_EXT.2.1: 2
    • FCS_TLSS_EXT.2.2: 1
    • FCS_TLSS_EXT.2.3: 1
    • FCS_TLSS_EXT.2.4: 2
    • FCS_TLSS_EXT.2.5: 1
    • FCS_TLSS_EXT.2.6: 1
    • FCS_TLS_EXT.1.1: 2
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT: 1
    • FIA_PMG_EXT.1: 10
    • FIA_PMG_EXT.1.1: 2
    • FIA_UAU.1: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.2: 12
    • FIA_UAU_EXT.2.1: 2
    • FIA_UIA_EXT: 3
    • FIA_UIA_EXT.1: 11
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
  • FMT:
    • FMT_MOF: 13
    • FMT_MOF.1: 2
    • FMT_MTD: 10
    • FMT_MTD.1: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 7
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 10
    • FPT_APW_EXT.1.1: 2
    • FPT_APW_EXT.1.2: 2
    • FPT_ITT: 7
    • FPT_ITT.1: 8
    • FPT_PTD: 1
    • FPT_SKP_EXT: 1
    • FPT_SKP_EXT.1: 10
    • FPT_SKP_EXT.1.1: 2
    • FPT_STM: 2
    • FPT_STM_EXT: 2
    • FPT_STM_EXT.1: 10
    • FPT_STM_EXT.1.1: 2
    • FPT_STM_EXT.1.2: 3
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 10
    • FPT_TST_EXT.1.1: 3
    • FPT_TST_EXT.2: 7
    • FPT_TST_EXT.2.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 11
    • FPT_TUD_EXT.1.1: 4
    • FPT_TUD_EXT.1.2: 3
    • FPT_TUD_EXT.1.3: 8
    • FPT_TUD_EXT.2: 7
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 5
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 5
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT: 2
    • FTA_SSL_EXT.1: 11
    • FTA_SSL_EXT.1.1: 2
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC: 7
    • FTP_ITC.1: 16
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 8
    • FTP_TRP.1: 2
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 5
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 57
    • FCS_CKM.1: 14
    • FCS_CKM.2: 3
    • FCS_CKM.4: 42
    • FCS_CKM.4.1: 1
    • FCS_COP: 84
    • FCS_COP.1: 12
    • FCS_RND: 6
    • FCS_RND.1: 22
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 25
    • FDP_ACC.1: 6
    • FDP_ACF: 28
    • FDP_ACF.1: 22
    • FDP_ACF.1.2: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_RIP: 6
    • FDP_RIP.1: 18
    • FDP_RIP.1.1: 1
    • FDP_UCT: 15
    • FDP_UCT.1: 1
    • FDP_UIT: 13
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 67
    • FIA_AFL.1: 12
    • FIA_API: 19
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 123
    • FIA_UAU.1: 12
    • FIA_UAU.4: 2
    • FIA_UAU.5: 6
    • FIA_UAU.6: 3
    • FIA_UID: 28
    • FIA_UID.1: 8
  • FMT:
    • FMT_LIM: 17
    • FMT_LIM.1: 19
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 18
    • FMT_LIM.2.1: 2
    • FMT_MSA.1: 1
    • FMT_MSA.3: 4
    • FMT_MTD: 153
    • FMT_MTD.1: 16
    • FMT_MTD.3: 8
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 52
    • FMT_SMF.1.1: 1
    • FMT_SMR: 44
    • FMT_SMR.1: 20
  • FPR:
    • FPR_ANO.1: 4
    • FPR_ANO.1.1: 1
    • FPR_UNL.1: 4
    • FPR_UNL.1.1: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 17
    • FTP_ITC.1: 6
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_: 1
    • A.COMPONENTS_RUNNING: 2
    • A.LIMITED_: 1
    • A.NO_THRU_: 1
    • A.PHYSICAL_: 1
    • A.REGULAR_: 1
    • A.RESIDUAL_: 1
    • A.TRUSTED_: 1
  • OE:
    • OE.ADMIN_CREDEN: 1
    • OE.NO_GENERAL_: 1
    • OE.NO_THRU_: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFO: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_: 1
    • T.PASSWORD_CRACKING: 3
    • T.SECURITY_: 2
    • T.SECURITY_FUNCTIONAL: 2
    • T.UNAUTHORIZED_: 1
    • T.UNAUTHORIZED_ADMINIS: 1
    • T.UNDETECTED_: 1
    • T.UNDETECTED_ACTIVITY: 2
    • T.UNTRUSTED_: 1
    • T.UNTRUSTED_COMMUNI: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
    • T.UPDATE_: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_: 2
    • T.WEAK_AUTHENTICATIO: 1
    • T.WEAK_CRYPTOGRAPHY: 1
  • OE:
    • OE.AA_MRTD: 9
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 17
  • Infineon:
    • Infineon: 22
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 19
      • AES-: 2
      • AES-128: 2
  • constructions:
    • MAC:
      • HMAC: 4
      • HMAC-SHA-256: 5
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 16
      • AES-128: 2
  • DES:
    • 3DES:
      • 3DES: 13
      • Triple-DES: 4
  • constructions:
    • MAC:
      • CMAC: 7
      • KMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 2
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 12
      • DHE: 2
      • Diffie-Hellman: 16
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 13
  • FF:
    • DH:
      • DH: 4
      • Diffie-Hellman: 9
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 1
    • SHA2:
      • SHA-256: 6
      • SHA-384: 1
      • SHA-512: 1
      • SHA2: 1
      • SHA256: 3
      • SHA384: 1
      • SHA512: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 2
    • SHA2:
      • SHA-2: 2
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
      • SHA224: 2
      • SHA256: 2
      • SHA384: 2
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 25
  • KA:
    • Key Agreement: 3
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 5
    • IKEv1: 12
    • IKEv2: 12
  • IPsec:
    • IPsec: 16
  • SSH:
    • SSH: 91
  • TLS:
    • DTLS:
      • DTLS: 73
      • DTLS 1.0: 9
      • DTLS 1.2: 9
      • DTLS v1.0: 4
      • DTLS v1.2: 4
    • SSL:
      • SSL: 7
      • SSL 2.0: 3
      • SSL 3.0: 3
    • TLS:
      • TLS: 82
      • TLS 1.0: 3
      • TLS 1.1: 6
      • TLS 1.2: 7
      • TLS v1.0: 2
      • TLS1.1: 1
      • TLS1.2: 1
  • PACE:
    • PACE: 244
  • PGP:
    • PGP: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 2
  • RNG:
    • RBG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • GCM:
    • GCM: 4
  • CBC:
    • CBC: 3
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-384: 2
    • curve P-384: 2
    • secp256r1: 8
    • secp384r1: 8
    • secp521r1: 8
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
  • Infineon:
    • v1.02.013: 8
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 4
    • Physical Tampering: 3
    • malfunction: 6
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 5
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 4
    • EF.DG1: 11
    • EF.DG13: 1
    • EF.DG14: 5
    • EF.DG15: 3
    • EF.DG16: 10
    • EF.DG2: 5
    • EF.DG3: 13
    • EF.DG4: 13
    • EF.DG5: 4
    • EF.SOD: 9
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-4: 2
  • ISO:
    • ISO/IEC 18031:2011: 5
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-57: 2
  • PKCS:
    • PKCS #1: 1
  • RFC:
    • RFC 1305: 1
    • RFC 2818: 8
    • RFC 2986: 2
    • RFC 3526: 1
    • RFC 3602: 2
    • RFC 4106: 1
    • RFC 4109: 1
    • RFC 4251: 2
    • RFC 4253: 8
    • RFC 4301: 2
    • RFC 4303: 1
    • RFC 4304: 1
    • RFC 4346: 4
    • RFC 4347: 9
    • RFC 4868: 2
    • RFC 4945: 1
    • RFC 5246: 9
    • RFC 5280: 7
    • RFC 5282: 1
    • RFC 5647: 2
    • RFC 5759: 1
    • RFC 5905: 1
    • RFC 5996: 2
    • RFC 6125: 8
    • RFC 6347: 9
    • RFC 6960: 1
    • RFC 8017: 1
  • X509:
    • X.509: 23
  • BSI:
    • AIS31: 4
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 180-4: 1
  • ICAO:
    • ICAO: 27
  • ISO:
    • ISO/IEC 14443: 6
    • ISO/IEC 18013: 6
    • ISO/IEC 7816-4: 1
    • ISO/IEC15946-2: 1
  • PKCS:
    • PKCS#3: 1
  • RFC:
    • RFC 2631: 1
    • RFC 5639: 1
    • RFC-5639: 3
    • RFC3369: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. RFC 5647 only applies to the RFC compliant: 2
    • out of scope: 2
  • OutOfScope:
    • of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security features: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Lachlan Turner
  • /CreationDate: D:20191021164206+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20191021164206+00'00'
  • /Subject: MDS, MDS with MTA, and MDS Manager v2.1
  • /Title: AhnLab
  • pdf_file_size_bytes: 1061933
  • pdf_hyperlinks: https://www.lightshipsec.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 94
  • /Author: IDEMIA
  • /CreationDate: D:20180907132439+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: NSCIB-CC-195748, ASE Lite, ICAO, ePassport, SAC, EAC, PCA-eMRTD, Polymorphic eMRTD
  • /ModDate: D:20180907132439+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: ASE-Lite 2018_2000037744, v1.0, 2018-09-07
  • /Title: Security Target Lite IDeal Pass v2.3-i JC (SAC/EAC/Polymorphic eMRTD Configuration)
  • pdf_file_size_bytes: 1925693
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 151
state/cert/convert_garbage False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different