Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
KECS-CISS-1035-2020
IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0
BSI-DSZ-CC-0866-2013
name Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme KR DE
status active archived
not_valid_after 26.08.2025 09.09.2014
not_valid_before 26.08.2020 20.12.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1035-2020_CR_EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0866a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1035-2020_ST_EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0866b_pdf.pdf
manufacturer HP Inc. Morpho B.V.
manufacturer_web https://www8.hp.com/hpnext/tags/hp-inc#.Vjdf803sn4g https://www.morpho.com
security_level EAL2+, ALC_FLR.2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst d5eaadb952636ef2 8afec54013a9d40d
heuristics/cert_id KECS-CISS-1035-2020 BSI-DSZ-CC-0866-2013
heuristics/cert_lab [] BSI
heuristics/extracted_sars ADV_ARC.1, AGD_OPE.1, ALC_FLR.2, AVA_VAN.2, ASE_OBJ.2, ASE_REQ.2, ALC_DEL.1, ALC_CMS.2, ASE_SPD.1, ATE_IND.2, ASE_TSS.1, ATE_COV.1, ASE_INT.1, AGD_PRE.1, ADV_FSP.2, ASE_CCL.1, ALC_CMC.2, ASE_ECD.1, ATE_FUN.1, ADV_TDS.1 ALC_FLR.3, ADV_ARC.1, ATE_COMP.1, AGD_OPE.1, APE_CCL.1, ALC_DVS.2, ATE_DPT.3, ALC_CMS.5, ASE_OBJ.2, APE_OBJ.2, ASE_REQ.2, ALC_DEL.1, ADV_FSP.5, APE_INT.1, ASE_COMP.1, ADV_COMP.1, ATE_COV.2, ASE_SPD.1, ALC_COMP.1, AVA_COMP.1, AVA_VAN.5, ATE_IND.2, ASE_TSS.1, ADV_INT.2, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ADV_SPM.1, APE_REQ.2, APE_ECD.1, ASE_CCL.1, ASE_ECD.1, ADV_TDS.4, ALC_CMC.4, ATE_FUN.1, ADV_IMP.1, ALC_TAT.2, APE_SPD.1
heuristics/extracted_versions - 4.0.0
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0866-V2-2014, BSI-DSZ-CC-0867-2014
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0750-2011, BSI-DSZ-CC-0858-2013
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0866-V2-2014, BSI-DSZ-CC-0867-2014
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0750-2011, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0858-2013
heuristics/scheme_data
  • category: Digital Multifunction Printer
  • cert_id: KECS-CISS-1035-2020
  • certification_date: 26.08.2020
  • enhanced:
    • assurance_level: EAL2+
    • cc_version: CC V3.1 R5
    • cert_id: KECS-CISS-1035-2020
    • cert_link: https://itscc.kr/file/download.do?file=KPR100000001577
    • certification_date: 26.08.2020
    • developer: HP Printing Korea Co., Ltd
    • expiration_date: 26.08.2025
    • holder: HP Inc.
    • maintenance_update: [frozendict({'name': 'Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series Assurance maintenance1', 'certification_date': datetime.date(2023, 11, 9), 'cert_id': 'KECS-CISS-1035a-2020', 'maintenance_link': 'https://itscc.kr/file/download.do?file=KPR200000001712', 'target_link': 'https://itscc.kr/file/download.do?file=KPR200000001713'})]
    • product: Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
    • product_type: Digital Multifunction Printer
    • protection_profile: U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std.2600.2-2009)
    • report_link: https://itscc.kr/file/download.do?file=KPR100000001569
    • target_link: https://itscc.kr/file/download.do?file=KPR100000001570
  • level: EAL2+
  • product: Samsung Multifunction MultiXpress K4250, K4300, K4350, K401, X4220, X4250, X4300, X401, X400, K7400, K7500, K7600, X7400, X7500, X7600, X704, X706, K705, K706 Series
  • product_link: https://itscc.kr/certprod/view.do?product_id=1035&product_class=1
  • vendor: HP Inc.
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0858-2013
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0858-2013
heuristics/protection_profiles 154ef77c252799ee a33327d40f253f46
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0058b.pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf
pdf_data/report_filename KECS-CISS-1035-2020_CR_EN.pdf 0866a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0866-2013
    • cert_item: IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0
    • cert_lab: BSI
    • developer: Morpho B.V
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • KR:
    • KECS-CISS-1035-2020: 1
  • DE:
    • BSI-DSZ-CC-0750-2011: 1
    • BSI-DSZ-CC-0750-2011-MA-02: 1
    • BSI-DSZ-CC-0858-2013: 1
    • BSI-DSZ-CC-0866: 1
    • BSI-DSZ-CC-0866-2013: 22
    • BSI-DSZ-CC-0867: 1
    • BSI-DSZ-CC-750: 1
    • BSI-DSZ-CC-858: 1
  • NL:
    • NSCIB-13-37760: 1
    • NSCIB-CC-13-37760: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0056-V2-2012: 4
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0068-V2: 1
    • BSI-CC-PP-0068-V2-2011: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL2 augmented: 2
    • EAL2+: 5
  • EAL:
    • EAL 4: 2
    • EAL 5: 6
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 8
    • EAL5+: 2
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 3
    • ADV_TDS.1: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.1: 4
    • ATE_FUN.1: 3
    • ATE_IND.2: 5
  • AVA:
    • AVA_VAN.2: 5
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 2
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 2
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 2
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FPT:
    • FPT_FDI_EXP: 1
    • FPT_FDI_EXP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 12
  • Morpho:
    • Morpho: 13
  • NXP:
    • NXP: 7
    • NXP Semiconductors: 4
pdf_data/report_keywords/eval_facility
  • KSEL:
    • KSEL: 3
  • BrightSight:
    • Brightsight: 1
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • TDES: 3
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 20
  • PGP:
    • PGP: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 6
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 2
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-03110: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 2: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 2
    • AIS 38: 1
    • AIS36: 2
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-4: 1
    • FIPS 186-3: 1
    • FIPS 197: 3
    • FIPS 46-3: 2
    • FIPS PUB 186-3: 1
    • FIPS180-2: 3
    • FIPS186-3: 1
  • ICAO:
    • ICAO: 17
    • ICAO-SAC: 8
  • NIST:
    • SP 800-38A: 3
  • RFC:
    • RFC 5639: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 5, Date: 2013-11-28, Security Target for the IDeal Pass v2 SAC/EAC JC ePassport 4.0.0, Morpho B.V. (confidential document) [7] Protection Profile Machine Readable Travel Document with „ICAO Application“, Extended Access: 1
    • Project / Certification ID: 8109164033 / BSI-DSZ-CC-0866, TÜV Informationstechnik GmbH, (confidential document) [10] Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with: 1
    • TOE, Version 1.1.2, Date: 2013-11-28, IDeal Pass v2 - SAC/EAC JC ePassport SAC/EAC configuration (confidential document) [12] Guidance documentation for the TOE, Version 1.1.0, Date: 2013-09-30, Preparative Guidance for: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20140205085022+01'00'
  • /Creator: Writer
  • /Keywords: "Morpho, MRTD, BSI, Common Criteria, Certification, Zertifizierung"
  • /ModDate: D:20140205101920+01'00'
  • /Producer: LibreOffice 3.6
  • /Subject: ePassport
  • /Title: Certification Report BSI-DSZ-CC-0866-2013
  • pdf_file_size_bytes: 973275
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename KECS-CISS-1035-2020_ST_EN.pdf 0866b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0750: 2
    • BSI-DSZ-CC-0858-: 1
    • BSI-DSZ-CC-0858-2013: 1
    • BSI-DSZ-CC-0866: 2
    • BSI-DSZ-CC-0867: 1
  • NL:
    • CC-1: 7
    • CC-2: 7
    • CC-3: 3
    • NSCIB-CC-13-37760: 5
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0068-V2-2011: 1
    • BSI-CC-PP-0055-2009: 1
    • BSI-CC-PP-0056-V2-2012: 3
    • BSI-CC-PP-0068-V2: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-PP-0035-2007: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 8
    • EAL2 augmented: 6
    • EAL3: 1
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 1
    • EAL5: 8
    • EAL5 augmented: 2
    • EAL5+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 12
    • ADV_FSP.1: 3
    • ADV_FSP.2: 16
    • ADV_TDS.1: 15
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 13
    • AGD_PRE: 1
    • AGD_PRE.1: 9
  • ALC:
    • ALC_CMC.2: 9
    • ALC_CMS.1: 1
    • ALC_CMS.2: 7
    • ALC_DEL.1: 6
    • ALC_FLR.2: 23
  • APE:
    • APE_ECD: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SPD: 1
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 13
    • ASE_INT.1: 15
    • ASE_OBJ.2: 12
    • ASE_REQ.1: 2
    • ASE_REQ.2: 14
    • ASE_SPD.1: 9
    • ASE_TSS.1: 6
  • ATE:
    • ATE_COV.1: 7
    • ATE_FUN.1: 11
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
  • ADV:
    • ADV_ARC.1: 3
    • ADV_COMP.1: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 2
    • AGD_PRE: 1
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_COMP.1: 1
    • ALC_DEL.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • APE:
    • APE_SRE: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_COMP.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COMP.1: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_COMP.1: 1
    • AVA_VAN.3: 1
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 35
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 29
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 10
    • FDP_IFC.2: 7
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 16
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 31
    • FMT_MSA.1.1: 4
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 31
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 8
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 41
    • FCS_CKM.1: 17
    • FCS_CKM.2: 4
    • FCS_CKM.4: 34
    • FCS_CKM.4.1: 1
    • FCS_COP: 56
    • FCS_COP.1: 12
    • FCS_RND: 8
    • FCS_RND.1: 16
    • FCS_RND.1.1: 2
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 7
    • FDP_ACF: 13
    • FDP_ACF.1: 20
    • FDP_ACF.1.2: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_RIP: 1
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
    • FDP_UCT: 8
    • FDP_UCT.1: 2
    • FDP_UIT: 8
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 5
    • FIA_AFL.1: 2
    • FIA_API: 21
    • FIA_API.1: 6
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 72
    • FIA_UAU.1: 4
    • FIA_UAU.4: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.6: 3
    • FIA_UID: 14
    • FIA_UID.1: 8
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 20
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 3
    • FMT_MSA.1: 1
    • FMT_MSA.3: 2
    • FMT_MTD: 71
    • FMT_MTD.1: 15
    • FMT_MTD.3: 10
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 36
    • FMT_SMR: 19
    • FMT_SMR.1: 22
    • FMT_SMR.1.1: 2
  • FPT:
    • FPT_EMS: 7
    • FPT_EMS.1: 12
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC: 11
    • FTP_ITC.1: 6
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 4
    • A.ADMIN: 8
    • A.USER: 4
  • D:
    • D.CONF: 7
    • D.DOC: 15
    • D.FUNC: 8
    • D.PROT: 4
  • O:
    • O.AUDIT: 6
    • O.AUDIT_ACCESS: 6
    • O.AUDIT_STORAG: 1
    • O.AUDIT_STORAGE: 5
    • O.CONF: 12
    • O.DOC: 13
    • O.FUNC: 6
    • O.INTERFACE: 6
    • O.PROT: 6
    • O.SOFTWARE: 6
    • O.USER: 12
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 4
    • OE.AUDIT_ACCESS: 4
    • OE.AUDIT_STORAGE: 4
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 14
  • T:
    • T.CONF: 8
    • T.DOC: 8
    • T.FUNC: 4
    • T.PROT: 4
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 9
  • Morpho:
    • Morpho: 164
  • NXP:
    • NXP: 14
pdf_data/st_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 1
    • TÜViT: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • 3DES: 2
  • AES_competition:
    • AES:
      • AES: 27
      • AES-128: 8
      • AES-192: 5
      • AES-256: 5
  • DES:
    • 3DES:
      • 3DES: 26
      • Triple-DES: 8
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CMAC: 10
      • KMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 9
    • ECDH:
      • ECDH: 14
    • ECDSA:
      • ECDSA: 19
  • FF:
    • DH:
      • DH: 12
      • Diffie-Hellman: 24
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA256: 1
  • SHA:
    • SHA1:
      • SHA-1: 10
      • SHA1: 6
    • SHA2:
      • SHA-224: 6
      • SHA-256: 8
      • SHA224: 5
      • SHA256: 5
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 15
  • KA:
    • Key Agreement: 4
  • MAC:
    • MAC: 29
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • PACE:
    • PACE: 253
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 9
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 1
pdf_data/st_keywords/ecc_curve
  • ANSSI:
    • ANSSI FRP256v1: 4
    • FRP256v1: 1
  • NIST:
    • NIST P-192: 4
    • NIST P-224: 4
    • NIST P-256: 4
    • P-192: 4
    • P-224: 4
    • P-256: 4
    • secp192r1: 4
    • secp224r1: 4
    • secp256r1: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • Malfunction: 3
    • Physical Tampering: 3
    • Physical tampering: 2
    • fault injection: 1
    • malfunction: 7
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 3
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 2: 4
    • JCOP2: 3
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 3
    • EF.DG1: 10
    • EF.DG13: 1
    • EF.DG14: 5
    • EF.DG16: 9
    • EF.DG2: 4
    • EF.DG3: 12
    • EF.DG4: 12
    • EF.DG5: 3
    • EF.SOD: 5
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 197: 1
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-3: 1
    • FIPS PUB 197: 1
  • ICAO:
    • ICAO: 19
    • ICAO-SAC: 37
  • ISO:
    • ISO/IEC 14443: 6
    • ISO/IEC 15946-1: 1
    • ISO/IEC 7816-2: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC15946-2: 1
  • PKCS:
    • PKCS#3: 6
  • RFC:
    • RFC 2631: 1
    • RFC 5639: 1
    • RFC-5639: 5
    • RFC3369: 1
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.security: 1
pdf_data/st_metadata
  • /Author: Morpho
  • /CreationDate: D:20131128000000
  • /Creator: PDFCreator Version 0.8.0
  • /Keywords: ASE, ASE-Lite, ST, ST-Lite, BSI-DSZ-CC-0866, SAC, EAC, ePassport, ePass, MRTD, Machine Readable Travel Documents, CC, EAL5+, ECC, PACEv2, Terminal Authentication, TA, Chip Authentication, CA, Active Authentication, AA
  • /ModDate: D:20131128000000
  • /Producer: AFPL Ghostscript 8.14
  • /Subject: Security Target Lite for the IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0 in SAC/EAC configuration
  • /Title: 7301-9301-112 ASE-Lite IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0 (SAC/EAC configuration) v1.0.3
  • pdf_file_size_bytes: 821000
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 152
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different