name |
FIN.X RTOS SE V4.0 |
PWPW SmartApp-MRTD 1.0 |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
IT |
DE |
status |
archived |
active |
not_valid_after |
25.07.2022 |
22.05.2028 |
not_valid_before |
25.07.2017 |
22.05.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1176c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_finx_rtos_se_4_v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1176a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/tds_finx_rtos_se_4_lite03.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1176b_pdf.pdf |
manufacturer |
MBDA Italia S.p.A. |
Polska Wytwórnia Papierów Wartościowych S.A. |
manufacturer_web |
https://www.mbda-systems.com/ |
https://www.pwpw.pl |
security_level |
EAL4+, ALC_FLR.1 |
ALC_DVS.2, EAL4+, ATE_DPT.2, AVA_VAN.5 |
dgst |
9cb1663e606ec87b |
3c8ae60e2a9985db |
heuristics/cert_id |
OCSI/CERT/RES/06/2014/RC |
BSI-DSZ-CC-1176-2023 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ALC_FLR.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
4.0 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
OCSI/CERT/LEO/08/2021/RC |
{} |
heuristics/report_references/directly_referencing |
OCSI/CERT/RES/03/2012/RC |
BSI-DSZ-CC-1110-V5-2022 |
heuristics/report_references/indirectly_referenced_by |
OCSI/CERT/LEO/08/2021/RC |
{} |
heuristics/report_references/indirectly_referencing |
OCSI/CERT/RES/03/2012/RC |
BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1110-V5-2022, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
|
- category: Electronic ID documents
- cert_id: BSI-DSZ-CC-1176-2023
- certification_date: 22.05.2023
- enhanced:
- applicant: Polska Wytwórnia Papierów Wartościowych S.A. 1 Sanguszki St. 00-222 Warsaw Poland
- assurance_level: EAL4+,ATE_DPT.2,ALC_DVS.2,AVA_VAN.5
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1176c_pdf.pdf?__blob=publicationFile&v=2
- certification_date: 22.05.2023
- description: The composite TOE is named PWPW SmartApp-MRTD and was evaluated in version 1.0. The TOE is an electronic travel document representing a contactless smart card.
- entries: [frozendict({'id': 'Machine', 'description': 'Extended Access Control'}), frozendict({'id': 'Common', 'description': 'Protection Profile'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 21.05.2028
- product: PWPW SmartApp-MRTD 1.0
- protection_profile: Machine Readable Travel Document with "ICAO Application", Extended Access Control with PACE (EAC PP), Version 1.3.2, 5 December 2012, BSI-CC-PP-0056-V2-2012-MA-02,Common Criteria Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP), Version 1.01, 22 July 2014, BSI-CC-PP-0068-V2-2011-MA-01
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1176a_pdf.pdf?__blob=publicationFile&v=3
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1176b_pdf.pdf?__blob=publicationFile&v=3
- product: PWPW SmartApp-MRTD 1.0
- subcategory: IC with applications
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Hoheitliche_Dokumente-IC_mit_Anwendung/1176.html
- vendor: Polska Wytwórnia Papierów Wartościowych S.A.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V5-2022 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V5-2022 |
heuristics/protection_profiles |
{} |
a33327d40f253f46, b380aabf93b29692 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename |
|
1176c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ICAO:
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: Common Criteria, Certification, Zertifizierung
- /Subject: Common Criteria, Certification, Zertifizierung
- /Title: Certificate BSI-DSZ-CC-1176-2023
- pdf_file_size_bytes: 231433
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
rc_finx_rtos_se_4_v1.0.pdf |
1176a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ATE_DPT.2, ALC_DVS.2 and AVA_VAN.5
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1176-2023
- cert_item: PWPW SmartApp-MRTD 1.0
- cert_lab: BSI
- developer: Polska Wytwórnia Papierów Wartościowych S.A
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Machine Readable Travel Document with "ICAO Application", Extended Access Control with PACE (EAC PP), Version 1.3.2, 5 December 2012, BSI- CC-PP-0056-V2-2012-MA-02, Common Criteria Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP), Version 1.01, 22 July 2014, BSI-CC-PP-0068-V2- 2011-MA-01
|
pdf_data/report_keywords/cc_cert_id |
- IT:
- OCSI/CERT/RES/03/2012/RC: 1
- OCSI/CERT/RES/06/2014/RC: 35
|
- DE:
- BSI-DSZ-CC-1110-V5-2022: 1
- BSI-DSZ-CC-1110-V5-2022-MA-01: 2
- BSI-DSZ-CC-1176: 1
- BSI-DSZ-CC-1176-2023: 14
- BSI-DSZ-CC-S-0168-2021-MA-01: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0056-: 2
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL2: 1
- EAL4: 9
- EAL4+: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 5
- EAL 4 augmented: 3
- EAL 5: 4
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 2
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_DPT.2: 4
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_STG.3: 1
- FAU_STG.4: 1
- FCS:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 11
- Infineon Technologies AG: 3
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- BSI:
- AIS 20: 3
- AIS 25: 3
- AIS 26: 4
- AIS 31: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 2
- AIS 36: 5
- AIS 37: 2
- AIS 46: 2
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- BSI-DSZ-CC-1176-2023: “PWPW SmartApp-MRTD 1.0 Security Target”, Version 1.0.14.0, 2023-03-09, PWPW (confidential document) Security Target Lite “PWPW SmartApp-MRTD 1.0 Security Target Lite”, Version 1.0.3.0, 2023-03-09: 1
- Date 2023-03-21, Evaluation Technical Report Summary BSI-DSZ-CC-1176, TÜV Informationstechnik GmbH (confidential document) [8] Machine Readable Travel Document with "ICAO Application", Extended Access Control with PACE: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: ocsi
- /CreationDate: D:20170727120322+02'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20170727120322+02'00'
- /Producer: Microsoft® Word 2010
- /Title: Rapporto di Certificazione del prodotto “FIN.X RTOS SE V4.0”
- pdf_file_size_bytes: 805511
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung"
- /Subject: Common Criteria, Certification, Zertifizierung
- /Title: Certification Report BSI-DSZ-CC-1176-2023
- pdf_file_size_bytes: 447732
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
pdf_data/st_filename |
tds_finx_rtos_se_4_lite03.pdf |
1176b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-V5-2022: 5
- BSI-DSZ-CC-1176: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0055: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 4
- EAL4 augmented: 2
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 1
- EAL 6: 1
- EAL 6 augmented: 1
- EAL 6+: 3
- EAL4: 1
- EAL4 augmented: 1
- EAL6: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.2: 4
- ALC_FLR.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.2: 4
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 5
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 10
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_SEL.1: 7
- FAU_SEL.1.1: 3
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 17
- FCS_CKM.1: 64
- FCS_CKM.1.1: 7
- FCS_CKM.2: 16
- FCS_CKM.2.1: 2
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.4: 1
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 24
- FCS_COP.1.1: 4
- FCS_COP.1.2: 1
- FCS_RNG_EXT.1: 1
- FDP:
- FDP_ACC.1: 20
- FDP_ACC.1.1: 1
- FDP_ACF.1: 14
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 3
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_RIP.2: 9
- FDP_RIP.2.1: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 2
- FDP_UIT.1: 7
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_AFL_EXT.1: 3
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 14
- FIA_SOS.1.1: 3
- FIA_UAU.1: 1
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.5: 11
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 3
- FIA_UAU.6: 7
- FIA_UAU.6.1: 1
- FIA_UAU.7: 10
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 2
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FIA_USB.1: 12
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 17
- FMT_MOF.1.1: 2
- FMT_MSA.1: 13
- FMT_MSA.1.1: 1
- FMT_MSA.2: 8
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 52
- FMT_MTD.1.1: 7
- FMT_REV.1: 25
- FMT_REV.1.1: 2
- FMT_SAE.1: 8
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR.1: 25
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 24
- FPT_FLS.1.1: 5
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.2: 7
- FTA_SSL.2.1: 1
- FTA_SSL.2.2: 2
- FTA_TAB.1: 8
- FTA_TAB.1.1: 2
- FTA_TAH.1: 8
- FTA_TAH.1.1: 2
- FTA_TAH.1.2: 2
- FTA_TAH.1.3: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 2
|
- FAU:
- FAU_SAS.1: 7
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 48
- FCS_CKM.1: 5
- FCS_CKM.4: 7
- FCS_CKM.4.1: 1
- FCS_COP: 68
- FCS_COP.1: 5
- FCS_RND.1: 7
- FCS_RND.1.1: 1
- FCS_RNG: 2
- FCS_RNG.1: 1
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 3
- FDP_ACF: 7
- FDP_ACF.1: 13
- FDP_RIP: 1
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FDP_SDC.1: 2
- FDP_SDI.2: 2
- FDP_UCT: 7
- FDP_UCT.1: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_ACC.1.1: 1
- FIA_AFL: 5
- FIA_AFL.1: 2
- FIA_API: 1
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_UAU: 34
- FIA_UAU.1: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 4
- FIA_UAU.6: 2
- FIA_UID: 4
- FIA_UID.1: 2
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 10
- FMT_LIM.1.1: 2
- FMT_LIM.2: 10
- FMT_LIM.2.1: 3
- FMT_MTD: 30
- FMT_MTD.1: 9
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_SMF.1: 2
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 3
- FPT:
- FPT_EMS: 1
- FPT_EMS.1: 3
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP.3: 2
- FPT_PHP.3.1: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FPT_TST.2: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.AUTHUSER: 3
- A.CONNECT: 3
- A.DETECT: 4
- A.MANAGE: 3
- A.PEER_FUNC: 2
- A.PEER_MGT: 2
- A.PHYSICAL: 3
- A.TRAINEDUSER: 3
- O:
- O.ACCESS: 10
- O.ACCESS_HISTORY: 4
- O.AUDIT_GENERATION: 8
- O.AUDIT_PROTECTION: 5
- O.AUDIT_REVIEW: 5
- O.CRYPTO_MEDIA: 7
- O.CRYPTO_NET: 13
- O.DISCRETIONARY_ACCESS: 11
- O.DISCRETIONARY_USER_CONTROL: 7
- O.DISPLAY_BANNER: 3
- O.ENFORCEMENT: 3
- O.MANAGE: 19
- O.PROTECT: 13
- O.RESIDUAL_INFORMATION: 4
- O.RUNTIME: 8
- O.TRUSTED_CHANNEL: 6
- O.USER_AUTHENTICATION: 12
- O.USER_IDENTIFICATION: 5
- OE:
- OE.ADMIN: 1
- OE.INFO_PROTECT: 1
- OE.INSTALL: 1
- OE.MAINTENANCE: 1
- OE.PHYSICAL: 4
- OE.RECOVER: 1
- OE.TRUSTED: 6
- T:
- T.ASSETS_COMPROMISE: 7
- T.AUDIT_COMPROMISE: 4
- T.COMM: 4
- T.MASQUERADE: 3
- T.RESIDUAL_DATA: 2
- T.TSFDATA: 3
- T.TSFFUNC: 4
- T.UNATTENDED_SESSION: 2
- T.UNAUTHORIZED_ACCESS: 7
- T.UNIDENTIFIED_ACTIONS: 2
- T.USER: 5
- T.USERDATA: 3
|
- O:
- O.AES: 2
- O.RND: 2
- O.TDES: 2
- T:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 6
- Infineon Technologies: 1
|
pdf_data/st_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 1
- TÜViT: 1
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 19
- TDEA: 1
- TDES: 2
- Triple-DES: 14
- DES:
- constructions:
- MAC:
- CBC-MAC: 8
- CMAC: 9
- KMAC: 2
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 2
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 7
- SHA-256: 10
- SHA-384: 5
- SHA-512: 5
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- NIST P-224: 2
- NIST P-256: 2
- NIST P-384: 2
- NIST P-521: 2
- P-224: 2
- P-256: 2
- P-384: 2
- P-521: 2
- secp224r1: 2
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 9
- Physical tampering: 2
- fault injection: 1
- malfunction: 2
- SCA:
- DPA: 1
- Leak-Inherent: 4
- physical probing: 3
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 1
- EF.DG1: 4
- EF.DG14: 2
- EF.DG16: 2
- EF.DG2: 4
- EF.DG3: 5
- EF.DG4: 5
- EF.DG5: 2
- EF.SOD: 5
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-2012-09-003: 1
- CCMB-2012-09-001: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 186-2: 1
- FIPS 186-4: 2
- FIPS PUB 186-2: 4
- FIPS PUB 186-4: 3
- FIPS140: 2
- FIPS186: 1
- FIPS186-2: 8
- FIPS186-3: 1
- FIPS186-4: 9
- RFC:
- RFC 2898: 2
- RFC 4252: 7
- RFC 4253: 6
- RFC 6668: 5
- RFC4253: 4
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS180-4: 6
- FIPS186-4: 12
- FIPS197: 4
- FIPS46-3: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- ISO/IEC 7816-2: 2
- ISO/IEC 9797-1: 2
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- DAC mechanism but may be supplemented by further restrictions. These additional restrictions are out of scope for this evaluation. Examples of objects which are accessible to users but cannot be used to store: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /Author: Krzysztof Janowski
- /Keywords: MRTD, Machine Readable Travel Document, e-Passport, Residence Permit
- /Subject: Security Target Lite
- /Title: PWPW SmartApp-MRTD 1.0
- pdf_file_size_bytes: 1311623
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 86
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |