Certificate

Extracted keywords

Security level
EAL 5, EAL 2, EAL 5 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-2013-MA-01
Certificates
BSI-DSZ-CC-1211-2023

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certificate BSI-DSZ-CC-1211-2023
Subject Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH
Keywords "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH"
Author Federal Office for Information Security
Pages 1

Certification report

Extracted keywords

Symmetric Algorithms
AES, 3DES
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH, DSA
Schemes
Key Exchange
Protocols
PACE, PGP
Randomness
RNG
Block cipher modes
CBC

Vendor
NXP Semiconductors, NXP

Security level
EAL 5, EAL 2, EAL 1, EAL 4, EAL6, EAL5+, EAL 5+, EAL 6, EAL6+, EAL 5 augmented, EAL6 augmented
Security Assurance Requirements (SAR)
ADV_ARC, ALC_DVS.2, ALC_FLR, ALC_FLR.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_COMP.1, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_TSS.2
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-2013-MA-01, BSI-CC-PP- 0084-2014, BSI-CC-PP-0084-2014, BSI-CC-PP- 0075-2012-MA-01, BSI-CC-PP-0071-, BSI-CC-PP- 0072-2012-MA-01, BSI-CC-PP-0056-v2-2012, BSI-CC-PP-0068-V2-2011-MA01, BSI-CC-PP-0086-2015
Certificates
BSI-DSZ-CC-1211-2023, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-1136-V3-2022-MA-01, BSI-DSZ-CC-1064-2020-MA-01, BSI-DSZ-CC-S-0207-, BSI-DSZ-CC-S-0232-2023, BSI-DSZ-CC-S-0233-2023, BSI-DSZ-CC-S-0181-2022
Evaluation facilities
TÜV Informationstechnik, SRC Security Research & Consulting

Side-channel analysis
JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, key generation and key import, MTCOS Pro 2.6 SSCD / P71D352 (N7121), MaskTech International GmbH (confidential document) 7 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für, 1.6, 20 October 2023, Evaluation Technical Report (ETR), SRC Security Research & Consulting GmbH (confidential document) [9] EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device, 2023, Configuration List of MTCOS Pro 2.6 SSCD / P71D352 (N7121), MaskTech International GmbH (confidential document) [19] User Guidance – MTCOS Pro 2.6 SSCD / P71D352 (N7121), Version 1.3, 30 August 2023, MaskTech, creation device with key generation, Version 0.1, 09 September 2022, MaskTech International GmbH (confidential document) 26 / 30 BSI-DSZ-CC-1211-2023 Certification Report C. Excerpts from the Criteria For the meaning

Standards
AIS 34, AIS 36, AIS 25, AIS 26, AIS 46, AIS 37, AIS 31, AIS 20, AIS 35, AIS 32, AIS 38, AIS 47, AIS36, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065
Technical reports
BSI TR-02102-1, BSI TR-03110, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1211-2023
Subject Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH
Keywords "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH"
Author Federal Office for Information Security
Pages 30

Frontpage

Certificate ID BSI-DSZ-CC-1211-2023
Certified item MTCOS Pro 2.6 SSCD / P71D352 (N7121
Certification lab BSI
Developer MaskTech International GmbH

References

Outgoing
  • BSI-DSZ-CC-1036-2019 - archived - MTCOS Pro 2.5 SSCD / SLE78CLFX400VPHM/BPHM/7PHM (M7892)
  • BSI-DSZ-CC-1136-V3-2022 - active - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
Incoming

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, Triple-DES, TDES, TDEA, KMAC, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-256, SHA-224, SHA-384, SHA-512
Schemes
MAC
Protocols
PACE
Randomness
RNG, RND
Block cipher modes
CBC

IC data groups
EF.DG14, EF.SOD
Trusted Execution Environments
SSC
Vendor
NXP Semiconductors, NXP

Security level
EAL5, EAL6, EAL5 augmented, EAL6 augmented
Claims
O.RND, O.TDES, O.AES, O.SHA, O.PUF, O.RSA, O.ECC, A.CSP, A.CGA, A.SCA, OT.TOE_TC_, OT.EMSEC_, OE.HID_VAD, OE.CGA_TC_
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_FLR.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_COP, FCS_COP.1, FCS_RND.1, FCS_RND, FCS_CKM.2, FCS_CKM.4.1, FCS_COP.1.1, FCS_RND.1.1, FCS_RND.1.2, FCS_RNG.1, FCS_RNG, FDP_ACC, FDP_ACF, FDP_ITC, FDP_UCT, FDP_RIP.1, FDP_SDI, FDP_UIT, FDP_DAU, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_IFC.1, FDP_UCT.1, FDP_UIT.1, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2, FDP_DAU.1, FDP_DAU.2, FDP_AFC, FDP_SDC.1, FDP_ITT.1, FIA_UID.1, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU, FIA_UAU.6, FIA_AFL, FIA_AFL.1, FIA_API.1, FIA_API, FIA_UAU.4, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_API.1.1, FMT_SMR.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MTD.1, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITC, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0059, BSI-CC-PP-0075, BSI-CC-PP- 0071, BSI-CC-PP-0072, BSI-CC-PP-0076, BSI-CC-PP-0084-2014, BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0075-MA-01, BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0076-2013-MA-01, BSI-CC-PP-0086-2015
Certificates
BSI-DSZ-CC-1211, BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-S-0232-2023, BSI-DSZ-CC-S-0233-2023, BSI-DSZ-CC-S-0207-2021, BSI-DSZ-CC-S-0214-2022, BSI-DSZ-CC-1211-2023

Side-channel analysis
Leak-Inherent, physical probing, side channel, physical tampering, malfunction, Malfunction, DFA, fault injection

Standards
FIPS 180-4, FIPS PUB 140-3, FIPS PUB 180-4, FIPS PUB 186-4, FIPS PUB 197, NIST SP 800-38B, NIST SP 800-56A, NIST SP 800-67, NIST SP 800-90A, PKCS #15, PKCS #1, PKCS#3, PKCS#1, AIS 31, RFC 8017, ISO/IEC 15408-2, ISO/IEC 15408-3, ISO/IEC 15408-1, ISO/IEC 10116-2017, ISO/IEC 7816, ICAO, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003
Technical reports
BSI TR-02102-1, BSI TR-03110

File metadata

Title MTCOS Pro 2.6 SSCD / P71D352 (N7121)- Security Target lite
Subject Common Criteria Certification
Keywords Common Criteria, CC, Secure Signature Creation Device, SSCD, MTCOS, EAL 5+
Author MaskTech International GmbH
Pages 130

References

Outgoing
  • BSI-DSZ-CC-1136-V3-2022 - active - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-1211-2023

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_COMP.1, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Products for Digital Signatures",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1211c_pdf.pdf",
  "dgst": "d50de8f311b752e5",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1211-2023",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.6"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "d918b28fd7bb5d79",
        "d9553e7194783182",
        "1f7ea2e05de5b88b",
        "27abdb9c6ab375a7",
        "4a814d0e3c9f9082"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1147-V3-2023"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1036-2019",
          "BSI-DSZ-CC-1136-V3-2022"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1148-V3-2023",
          "BSI-DSZ-CC-1147-V3-2023"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0995-2018",
          "BSI-DSZ-CC-0891-2015",
          "BSI-DSZ-CC-1136-V2-2022",
          "BSI-DSZ-CC-0996-2018",
          "BSI-DSZ-CC-1136-V3-2022",
          "BSI-DSZ-CC-1034-2019",
          "BSI-DSZ-CC-0782-2012",
          "BSI-DSZ-CC-1001-2018",
          "BSI-DSZ-CC-1136-2021",
          "BSI-DSZ-CC-0891-V2-2016",
          "BSI-DSZ-CC-0973-V2-2016",
          "BSI-DSZ-CC-0973-2016",
          "BSI-DSZ-CC-1033-2019",
          "BSI-DSZ-CC-1036-2019",
          "BSI-DSZ-CC-0891-V3-2018"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-V3-2022"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-V3-2022"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "MaskTech International GmbH",
  "manufacturer_web": "https://www.masktech.de/",
  "name": "MTCOS Pro 2.6 SSCD / P71D352 (N7121)",
  "not_valid_after": "2028-10-27",
  "not_valid_before": "2023-10-27",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1211c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1211-2023": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-02": 1,
          "BSI-CC-PP-0071-2012-MA-01": 1,
          "BSI-CC-PP-0072-2012-MA-01": 1,
          "BSI-CC-PP-0075-2012-MA-01": 1,
          "BSI-CC-PP-0076-2013-MA-01": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 5": 2,
          "EAL 5 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Federal Office for Information Security",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH",
      "/Title": "Certificate BSI-DSZ-CC-1211-2023",
      "pdf_file_size_bytes": 231878,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1211a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 valid until: 26 October 2028",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1211-2023",
        "cert_item": "MTCOS Pro 2.6 SSCD / P71D352 (N7121",
        "cert_lab": "BSI",
        "developer": "MaskTech International GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "EN 419211-2:2013 (BSI-CC-PP-0059-2009-MA-02), EN 419211-3:2013 (BSI-CC-PP-0075-2012-MA-01), EN 419211-4:2013 (BSI-CC-PP-0071-2012-MA-01) EN 419211-5:2013 (BSI-CC-PP-0072-2012-MA-01), EN 419211-6:2014 (BSI-CC-PP-0076-2013-MA-01"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1036-2019": 3,
          "BSI-DSZ-CC-1064-2020-MA-01": 1,
          "BSI-DSZ-CC-1136-V3-2022": 10,
          "BSI-DSZ-CC-1136-V3-2022-MA-01": 2,
          "BSI-DSZ-CC-1211-2023": 18,
          "BSI-DSZ-CC-S-0181-2022": 1,
          "BSI-DSZ-CC-S-0207-": 1,
          "BSI-DSZ-CC-S-0232-2023": 1,
          "BSI-DSZ-CC-S-0233-2023": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0072-2012-MA-01": 1,
          "BSI-CC-PP- 0075-2012-MA-01": 1,
          "BSI-CC-PP- 0084-2014": 1,
          "BSI-CC-PP-0056-v2-2012": 1,
          "BSI-CC-PP-0059-2009-MA-02": 3,
          "BSI-CC-PP-0068-V2-2011-MA01": 1,
          "BSI-CC-PP-0071-": 1,
          "BSI-CC-PP-0071-2012-MA-01": 3,
          "BSI-CC-PP-0072-2012-MA-01": 3,
          "BSI-CC-PP-0075-2012-MA-01": 3,
          "BSI-CC-PP-0076-2013-MA-01": 3,
          "BSI-CC-PP-0084-2014": 3,
          "BSI-CC-PP-0086-2015": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.5": 1,
          "ALC_COMP.1": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 5,
          "ALC_FLR": 2,
          "ALC_FLR.1": 3,
          "ALC_LCD.1": 1,
          "ALC_TAT.2": 1
        },
        "ASE": {
          "ASE_TSS.2": 3
        },
        "ATE": {
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 4": 1,
          "EAL 5": 8,
          "EAL 5 augmented": 3,
          "EAL 5+": 1,
          "EAL 6": 1,
          "EAL5+": 1,
          "EAL6": 4,
          "EAL6 augmented": 3,
          "EAL6+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "1.6, 20 October 2023, Evaluation Technical Report (ETR), SRC Security Research \u0026 Consulting GmbH (confidential document) [9] EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device": 1,
          "2023, Configuration List of MTCOS Pro 2.6 SSCD / P71D352 (N7121), MaskTech International GmbH (confidential document) [19] User Guidance \u2013 MTCOS Pro 2.6 SSCD / P71D352 (N7121), Version 1.3, 30 August 2023, MaskTech": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1,
          "creation device with key generation, Version 0.1, 09 September 2022, MaskTech International GmbH (confidential document) 26 / 30 BSI-DSZ-CC-1211-2023 Certification Report C. Excerpts from the Criteria For the meaning": 1,
          "key generation and key import, MTCOS Pro 2.6 SSCD / P71D352 (N7121), MaskTech International GmbH (confidential document) 7 specifically \u2022 AIS 20, Version 3, Funktionalit\u00e4tsklassen und Evaluationsmethodologie f\u00fcr": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 7
        },
        "PGP": {
          "PGP": 1
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "SRC": {
          "SRC Security Research \u0026 Consulting": 3
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "other": {
          "JIL": 5
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 25": 3,
          "AIS 26": 3,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 35": 2,
          "AIS 36": 3,
          "AIS 37": 2,
          "AIS 38": 1,
          "AIS 46": 3,
          "AIS 47": 1,
          "AIS36": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102-1": 1,
          "BSI TR-03110": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 5,
          "NXP Semiconductors": 11
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Federal Office for Information Security",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH",
      "/Title": "Certification Report BSI-DSZ-CC-1211-2023",
      "pdf_file_size_bytes": 433901,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 30
    },
    "st_filename": "1211b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 6
          },
          "ECDH": {
            "ECDH": 13
          },
          "ECDSA": {
            "ECDSA": 10
          }
        },
        "FF": {
          "DH": {
            "DH": 10,
            "Diffie-Hellman": 6
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V3-2022": 1,
          "BSI-DSZ-CC-1211": 2,
          "BSI-DSZ-CC-1211-2023": 1,
          "BSI-DSZ-CC-S-0207-2021": 1,
          "BSI-DSZ-CC-S-0214-2022": 1,
          "BSI-DSZ-CC-S-0232-2023": 1,
          "BSI-DSZ-CC-S-0233-2023": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 3,
          "A.CSP": 5,
          "A.SCA": 3
        },
        "O": {
          "O.AES": 1,
          "O.ECC": 1,
          "O.PUF": 1,
          "O.RND": 1,
          "O.RSA": 1,
          "O.SHA": 1,
          "O.TDES": 1
        },
        "OE": {
          "OE.CGA_TC_": 1,
          "OE.HID_VAD": 7
        },
        "OT": {
          "OT.EMSEC_": 1,
          "OT.TOE_TC_": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0071": 1,
          "BSI-CC-PP-0056-V2-2012-MA-02": 1,
          "BSI-CC-PP-0059": 1,
          "BSI-CC-PP-0059-2009-MA-02": 2,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1,
          "BSI-CC-PP-0071-2012-MA-01": 2,
          "BSI-CC-PP-0072": 1,
          "BSI-CC-PP-0072-2012-MA-01": 2,
          "BSI-CC-PP-0075": 1,
          "BSI-CC-PP-0075-2012-MA-01": 1,
          "BSI-CC-PP-0075-MA-01": 1,
          "BSI-CC-PP-0076": 1,
          "BSI-CC-PP-0076-2013-MA-01": 1,
          "BSI-CC-PP-0084-2014": 2,
          "BSI-CC-PP-0086-2015": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 4,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_IMP.1": 3,
          "ADV_INT.2": 2,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 2
        },
        "AGD": {
          "AGD_OPE.1": 3,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMS.5": 2,
          "ALC_DEL.1": 2,
          "ALC_DVS.2": 9,
          "ALC_FLR.1": 1,
          "ALC_LCD.1": 2,
          "ALC_TAT.2": 2
        },
        "ASE": {
          "ASE_CCL.1": 3,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 3,
          "ASE_OBJ.2": 3,
          "ASE_REQ.2": 3,
          "ASE_SPD.1": 3,
          "ASE_TSS.1": 3,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV.2": 2,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL5": 10,
          "EAL5 augmented": 6,
          "EAL6": 1,
          "EAL6 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM": 112,
          "FCS_CKM.1": 30,
          "FCS_CKM.2": 11,
          "FCS_CKM.4": 44,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 141,
          "FCS_COP.1": 24,
          "FCS_COP.1.1": 1,
          "FCS_RND": 1,
          "FCS_RND.1": 13,
          "FCS_RND.1.1": 1,
          "FCS_RND.1.2": 1,
          "FCS_RNG": 3,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 77,
          "FDP_ACC.1": 36,
          "FDP_ACF": 36,
          "FDP_ACF.1": 36,
          "FDP_AFC": 18,
          "FDP_DAU": 10,
          "FDP_DAU.1": 1,
          "FDP_DAU.2": 2,
          "FDP_IFC.1": 19,
          "FDP_ITC": 8,
          "FDP_ITC.1": 25,
          "FDP_ITC.2": 22,
          "FDP_ITT.1": 1,
          "FDP_RIP.1": 10,
          "FDP_RIP.1.1": 1,
          "FDP_SDC.1": 1,
          "FDP_SDI": 21,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 5,
          "FDP_UCT": 10,
          "FDP_UCT.1": 1,
          "FDP_UIT": 12,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 23,
          "FIA_AFL.1": 7,
          "FIA_API": 1,
          "FIA_API.1": 8,
          "FIA_API.1.1": 1,
          "FIA_UAU": 25,
          "FIA_UAU.1": 20,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 2,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 2,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 12,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 21,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 2,
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MOF.1": 8,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 69,
          "FMT_MSA.1": 9,
          "FMT_MSA.2": 9,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 20,
          "FMT_MSA.4": 4,
          "FMT_MTD": 44,
          "FMT_MTD.1": 5,
          "FMT_SMF.1": 29,
          "FMT_SMF.1.1": 2,
          "FMT_SMR.1": 35,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 20,
          "FPT_EMS.1": 7,
          "FPT_FLS.1": 11,
          "FPT_FLS.1.1": 1,
          "FPT_ITC": 1,
          "FPT_ITT.1": 1,
          "FPT_PHP.1": 7,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 10,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 13,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 40,
          "FTP_ITC.1": 16,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 10
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 91
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 10
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 3,
            "SHA-256": 8,
            "SHA-384": 3,
            "SHA-512": 4
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.DG14": 1,
          "EF.SOD": 2
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 5
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Malfunction": 1,
          "fault injection": 2,
          "malfunction": 1,
          "physical tampering": 4
        },
        "SCA": {
          "Leak-Inherent": 1,
          "physical probing": 2,
          "side channel": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS PUB 140-3": 1,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 186-4": 1,
          "FIPS PUB 197": 1
        },
        "ICAO": {
          "ICAO": 3
        },
        "ISO": {
          "ISO/IEC 10116-2017": 1,
          "ISO/IEC 15408-1": 1,
          "ISO/IEC 15408-2": 1,
          "ISO/IEC 15408-3": 1,
          "ISO/IEC 7816": 2
        },
        "NIST": {
          "NIST SP 800-38B": 1,
          "NIST SP 800-56A": 1,
          "NIST SP 800-67": 1,
          "NIST SP 800-90A": 1
        },
        "PKCS": {
          "PKCS #1": 2,
          "PKCS #15": 1,
          "PKCS#1": 2,
          "PKCS#3": 1
        },
        "RFC": {
          "RFC 8017": 3
        },
        "X509": {
          "X.509": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 25
          }
        },
        "DES": {
          "3DES": {
            "3DES": 12,
            "TDEA": 1,
            "TDES": 5,
            "Triple-DES": 3
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 8,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-02102-1": 1,
          "BSI TR-03110": 1
        }
      },
      "tee_name": {
        "IBM": {
          "SSC": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1,
          "NXP Semiconductors": 7
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "MaskTech International GmbH",
      "/Keywords": "Common Criteria, CC, Secure Signature Creation Device, SSCD, MTCOS, EAL 5+",
      "/Subject": "Common Criteria Certification",
      "/Title": "MTCOS Pro 2.6 SSCD / P71D352 (N7121)- Security Target lite",
      "pdf_file_size_bytes": 1200444,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 130
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1211a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "ALC_DVS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1211b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "77128675554f931d4de8d96cd26fea9521dd0a198503cc39a6808b7265188b70",
      "txt_hash": "a0e504feee743ba153d105f17064a1f06558b394c4a31a4114b9d828f1eed6d7"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b95d100857102407740fa9bb6d0507628366f82ce97b6cb26aa1d8cff9ed670a",
      "txt_hash": "9b93b87d9dd47d3e8256f2e146abd9587dcd55242d3621f10200ab8d4a947976"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e0b965d1e5ea28aaa924df705ac17e760634619e68f0aa9c11cf6050c4a511f9",
      "txt_hash": "0ccc64215e7b13811f31046fcf84db694101b0f84895d4c4f15cb6afb55b5070"
    }
  },
  "status": "active"
}