Veridos/Giesecke+Devrient MS Sm@rtCafé® Expert 8.0 C1

CSV information ?

Status active
Valid from 01.09.2022
Valid until 01.09.2027
Scheme 🇳🇱 NL
Manufacturer Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_FLR.1, EAL6+

Heuristics summary ?

Certificate ID: NSCIB-CC-0289060-CR

Certificate ?

Extracted keywords

Vendor
Giesecke+Devrient

Security level
EAL6, EAL2, EAL 7, EAL6 augmented
Claims
R.L
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR.3
Certificates
CC-22-0289060
Evaluation facilities
SGS, SGS Brightsight, Brightsight

Standards
ISO/IEC 15408-1, ISO/IEC 15408-2, ISO/IEC 15408-3, ISO/IEC 18045

File metadata

Title Microsoft Word - NSCIB-CC-0289060-Cert.doc
Author kruitr
Creation date D:20220928162204+02'00'
Modification date D:20220928162236+02'00'
Pages 1
Creator Bullzip PDF Printer (11.0.0.2588)
Producer PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, CMAC, CBC-MAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, EdDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Block cipher modes
ECB, CBC, GCM

Vendor
Giesecke+Devrient, G&D

Security level
EAL4, EAL6, EAL6+, EAL5+, EAL 6, EAL6 augmented, EAL 6 augmented
Security Assurance Requirements (SAR)
ADV_IMP, ALC_FLR.1, AVA_VAN.5, AVA_VAN
Certificates
BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-0289060-CR
Evaluation facilities
SGS, SGS Brightsight, Brightsight

Side-channel analysis
side-channel, JIL-AM, JIL-AAPS, JIL

Standards
ISO/IEC 7816, ISO/IEC 14443

File metadata

Title Certification Report
Author JM2
Creation date D:20220922114103+02'00'
Modification date D:20220922114103+02'00'
Pages 13
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Frontpage

Certificate ID NSCIB-CC-0289060-CR
Certified item Sm@rtCafé® Expert 8.0 C1
Certification lab SGS Brightsight B.V.
Developer Giesecke+Devrient Mobile Security GmbH

References

Outgoing
  • BSI-DSZ-CC-1107-V3-2022 - active - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance
Incoming

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, 3-DES, Triple-DES, TDES, TDEA, CBC-MAC, CMAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3-224, SHA-3-256, SHA-3-384, SHA-3-512, SHA-3
Schemes
MAC, Key Agreement
Randomness
TRNG, RNG, RND
Block cipher modes
ECB, CBC, CTR, CFB

JavaCard versions
Java Card 2.2.2
JavaCard API constants
TYPE_ACCESS
Vendor
Infineon Technologies AG, Infineon, Giesecke+Devrient, G+D, G&D

Security level
EAL6+, EAL 6+, EAL6, EAL 4+, EAL 6, EAL6 augmented, EAL 6 augmented
Claims
D.APP_I_DATA, D.APP_CODE, D.SEC_DATA, D.PIN, D.CRYPTO, O.CARD-, O.SCP, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.ARRAY_VIEWS_CONFID, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.PIN-, O.ARRAY_VIEWS_INTEG, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, O.CODE_CAP_, O.CODE_CAP, O.JAVAOBJEC, O.GLOBAL_ARRAYS, O.KEY-, O.PINMNGT, O.RND, O.TDES, O.AES, T.SECURE_DELETION, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-APPLI-, T.INTEG-APPLI-, T.CONFID-, T.INTEGJCS-DATA, T.EXECODE, T.OBJDELETION, T.INTEG-, T.INTEGAPPLI-DATA, T.INTEGAPPLI-CODE, T.INTEG-JCS-, T.INTEG-JCSCODE, A.CAP_FILE, A.DELETION, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_T_LOAD, OP.ARRAY_T_ASTORE, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.ARRAY_T_ALOAD, OP.PUTFIELD, OP.PUTSTATIC, OP.PUT, OE.CARD-MANAGEMENT, OE.SCP, OE.CAP_FILE, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.CODE-, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_SPM.1, ADV_FSP.4, ADV_ARC, ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.5, ADV_IMP.1, ADV_IMP.2, ADV_TDS.3, ADV_INT.3, ADV_FSP.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_DVS.2, ALC_CMC.5, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.3, ATE_FUN.1, ATE_FUN.2, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_INT.2, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAS.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_CKM.2, FCS_CKM, FCS_COP, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_ITT.1, FDP_SDC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FIA_API.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FPR_UNO.1, FPR_UNO.1.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_PHP.3.1, FPT_TST.2, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.3, FTP_TRP.1
Protection profiles
BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1107-V3-2022, BSI-DSZ-CC-1107-
Certification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are, with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Veridos/Giesecke+Devrient MS Security Target Lite Sm@rtCafé® Expert 8.0 C1/Version 3, 384, 521}r1[SEC2], brainpoolP{224, 256, 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Veridos/Giesecke+Devrient MS Security Target Lite Sm@rtCafé® Expert 8.0 C1/Version 3, 4 [AIS20],[AIS31]12 that implements13: 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10

Side-channel analysis
Leak-Inherent, physical probing, physical tampering, Malfunction, JIL
Certification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are, with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Veridos/Giesecke+Devrient MS Security Target Lite Sm@rtCafé® Expert 8.0 C1/Version 3, 384, 521}r1[SEC2], brainpoolP{224, 256, 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Veridos/Giesecke+Devrient MS Security Target Lite Sm@rtCafé® Expert 8.0 C1/Version 3, 4 [AIS20],[AIS31]12 that implements13: 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10

Standards
FIPS 186-4, FIPS 197, FIPS180-4, FIPS PUB 202, FIPS 140-2, PKCS1, PKCS5, PKCS3, AIS20, AIS31, AIS 31, AIS 20, RFC5639, RFC 5639, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9796-2, SCP02, SCP03, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-001

File metadata

Title Veridos/Giesecke+Devrient MS Security Target Lite
Subject Sm@rtCafé® Expert 8.0 C1
Keywords Version 3.1/Status 31.08.2022
Author G+D MS / stut
Creation date D:20220831171648+02'00'
Modification date D:20220831172417+02'00'
Pages 133
Creator Acrobat PDFMaker 22 für Word
Producer Adobe PDF Library 22.1.149

References

Outgoing
  • BSI-DSZ-CC-1107-V3-2022 - active - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance

Heuristics ?

Certificate ID: NSCIB-CC-0289060-CR

Extracted SARs

ASE_ECD.1, AVA_VAN.5, ALC_FLR.1, ALC_DEL.1, ATE_COV.3, AGD_PRE.1, ATE_DPT.3, ALC_LCD.1, ADV_IMP.2, ASE_REQ.2, ASE_CCL.1, ALC_CMS.5, ASE_OBJ.2, ADV_ARC.1, ALC_TAT.3, ALC_DVS.2, ADV_TDS.5, ALC_CMC.5, ATE_FUN.2, ASE_INT.2, ADV_INT.3, ADV_FSP.5, ASE_SPD.1, AGD_OPE.1, ASE_TSS.1, ADV_SPM.1

References ?

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2dc2dcab9ed1e28f5fe68fcc9dd256f60ccb666d30d028a42d0c6e977c98dfcd', 'txt_hash': '4c9dece3582a7a280307b4ca5b0fcf054d792b629ec8bc2622718e00cfd5ff02'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4c4dc22dc6d8087dc2f7fe4efe6af3e80258fd1603d09577b5e8db7369231483', 'txt_hash': '60f8537fffc5dc18864b142b2866103b4cd994b1aa3991b460402434bd4137ee'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1743509, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 133, '/Author': 'G+D MS / stut', '/Category': 'Public', '/Chip': 'SLC37GDA512', '/Comments': 'Public', '/Company': 'G+D Mobile Security GmbH', '/CreationDate': "D:20220831171648+02'00'", '/Creator': 'Acrobat PDFMaker 22 für Word', '/HWManufacturer': 'Infineon', '/Keywords': 'Version 3.1/Status 31.08.2022', '/ModDate': "D:20220831172417+02'00'", '/Producer': 'Adobe PDF Library 22.1.149', '/ProductName': 'Sm@rtCafé® Expert 8.0 C1', '/SourceModified': 'D:20220831151510', '/Subject': 'Sm@rtCafé® Expert 8.0 C1', '/TOE': 'Sm@rtCafé® Expert 8.0 C1', '/Title': 'Veridos/Giesecke+Devrient MS Security Target Lite', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 247691, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'kruitr', '/CreationDate': "D:20220928162204+02'00'", '/Creator': 'Bullzip PDF Printer (11.0.0.2588)', '/ModDate': "D:20220928162236+02'00'", '/Producer': 'PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH', '/Title': 'Microsoft Word - NSCIB-CC-0289060-Cert.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1107-V3-2022': 2, 'BSI-DSZ-CC-1107-': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-V2-2020': 2, 'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6+': 1, 'EAL 6+': 1, 'EAL6': 4, 'EAL 4+': 1, 'EAL 6': 3, 'EAL6 augmented': 2, 'EAL 6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 3, 'ADV_FSP.4': 3, 'ADV_ARC': 5, 'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 9, 'ADV_TDS.5': 6, 'ADV_IMP.1': 6, 'ADV_IMP.2': 2, 'ADV_TDS.3': 3, 'ADV_INT.3': 1, 'ADV_FSP.2': 2, 'ADV_TDS.4': 1}, 'AGD': {'AGD_OPE.1': 7, 'AGD_PRE.1': 5}, 'ALC': {'ALC_FLR.1': 6, 'ALC_DVS.2': 4, 'ALC_CMC.5': 3, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 2, 'ALC_CMS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_FUN.1': 6, 'ATE_FUN.2': 1, 'ATE_COV.1': 2, 'ATE_COV.2': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.2': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 21, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 3}, 'FCS': {'FCS_RNG': 5, 'FCS_RNG.1.1': 5, 'FCS_RNG.1': 13, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 36, 'FCS_CKM.4': 29, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 118, 'FCS_CKM.2': 4, 'FCS_CKM': 7, 'FCS_COP': 8}, 'FDP': {'FDP_ACC': 30, 'FDP_ACC.2': 5, 'FDP_ACF': 29, 'FDP_ACF.1': 13, 'FDP_IFC': 31, 'FDP_IFC.1': 13, 'FDP_IFF': 23, 'FDP_IFF.1': 17, 'FDP_RIP': 139, 'FDP_RIP.1': 11, 'FDP_ROL.1': 5, 'FDP_ROL': 16, 'FDP_SDI': 15, 'FDP_SDI.2': 4, 'FDP_ITC': 12, 'FDP_ITC.2': 20, 'FDP_IFC.2': 2, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_ACC.1': 11, 'FDP_ITC.1': 8, 'FDP_ITT.1': 1, 'FDP_SDC.1': 2}, 'FIA': {'FIA_ATD': 10, 'FIA_ATD.1': 2, 'FIA_UID': 16, 'FIA_UID.2': 1, 'FIA_USB': 9, 'FIA_USB.1': 3, 'FIA_UID.1': 9, 'FIA_API.1': 1}, 'FMT': {'FMT_MSA': 101, 'FMT_MSA.1': 10, 'FMT_MSA.2': 2, 'FMT_MSA.3': 17, 'FMT_SMF.1': 20, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 32, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 22, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_SMR': 35, 'FMT_SMF': 22, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_LIM': 4}, 'FPR': {'FPR_UNO.1': 10, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_PHP.3': 9, 'FPT_TST.1': 9, 'FPT_FLS.1': 21, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 39, 'FPT_RCV': 13, 'FPT_RCV.3': 10, 'FPT_PHP.3.1': 3, 'FPT_TST.2': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_I_DATA': 2, 'D.APP_CODE': 1, 'D.SEC_DATA': 1, 'D.PIN': 1, 'D.CRYPTO': 2}, 'O': {'O.CARD-': 6, 'O.SCP': 64, 'O.SID': 33, 'O.FIREWALL': 43, 'O.GLOBAL_ARRAYS_CONFID': 19, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.ARRAY_VIEWS_CONFID': 11, 'O.NATIVE': 14, 'O.OPERATE': 36, 'O.REALLOCATION': 18, 'O.RESOURCES': 23, 'O.ALARM': 22, 'O.CIPHER': 15, 'O.RNG': 11, 'O.KEY-MNGT': 15, 'O.PIN-MNGT': 18, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 9, 'O.DELETION': 17, 'O.LOAD': 19, 'O.INSTALL': 16, 'O.CARD-MANAGEMENT': 27, 'O.PIN-': 5, 'O.ARRAY_VIEWS_INTEG': 9, 'O.APPLET': 16, 'O.CODE_CAP_FILE': 12, 'O.JAVAOBJECT': 46, 'O.CODE_CAP_': 1, 'O.CODE_CAP': 1, 'O.JAVAOBJEC': 1, 'O.GLOBAL_ARRAYS': 1, 'O.KEY-': 8, 'O.PINMNGT': 1, 'O.RND': 4, 'O.TDES': 2, 'O.AES': 1}, 'T': {'T.SECURE_DELETION': 8, 'T.CONFID-APPLI-DATA': 17, 'T.CONFID-JCS-CODE': 3, 'T.CONFID-JCS-DATA': 4, 'T.INTEG-APPLI-CODE': 5, 'T.INTEG-APPLI-DATA': 13, 'T.INTEG-JCS-CODE': 4, 'T.INTEG-JCS-DATA': 3, 'T.SID': 16, 'T.EXE-CODE': 6, 'T.NATIVE': 5, 'T.RESOURCES': 7, 'T.DELETION': 4, 'T.INSTALL': 5, 'T.OBJ-DELETION': 2, 'T.PHYSICAL': 3, 'T.CONFID-APPLI-': 1, 'T.INTEG-APPLI-': 4, 'T.CONFID-': 8, 'T.INTEGJCS-DATA': 6, 'T.EXECODE': 1, 'T.OBJDELETION': 1, 'T.INTEG-': 10, 'T.INTEGAPPLI-DATA': 1, 'T.INTEGAPPLI-CODE': 2, 'T.INTEG-JCS-': 2, 'T.INTEG-JCSCODE': 1}, 'A': {'A.CAP_FILE': 6, 'A.DELETION': 7, 'A.VERIFICATION': 6}, 'R': {'R.JAVA': 14}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.ARRAY_LENGTH': 4, 'OP.ARRAY_T_LOAD': 1, 'OP.ARRAY_T_ASTORE': 3, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_CAP_FILE': 3, 'OP.DELETE_CAP_FILE_APPLET': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 6, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.ARRAY_T_ALOAD': 2, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1, 'OP.PUT': 5}, 'OE': {'OE.CARD-MANAGEMENT': 6, 'OE.SCP': 13, 'OE.CAP_FILE': 9, 'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 15, 'OE.CODE-': 5}, 'OSP': {'OSP.VERIFICATION': 7}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 1}, 'GD': {'Giesecke+Devrient': 7, 'G+D': 6, 'G&D': 10}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 29}}, 'DES': {'DES': {'DES': 14}, '3DES': {'3DES': 3, '3-DES': 7, 'Triple-DES': 4, 'TDES': 3, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 10, 'CMAC': 6}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 12}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 8}, 'ECC': {'ECC': 9}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 3, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 4}, 'SHA3': {'SHA-3-224': 3, 'SHA-3-256': 3, 'SHA-3-384': 2, 'SHA-3-512': 3, 'SHA-3': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 10}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 19, 'RND': 4}}, 'cipher_mode': {'ECB': {'ECB': 9}, 'CBC': {'CBC': 6}, 'CTR': {'CTR': 5}, 'CFB': {'CFB': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 1}, 'FI': {'physical tampering': 5, 'Malfunction': 3}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-4': 7, 'FIPS 197': 10, 'FIPS180-4': 3, 'FIPS PUB 202': 4, 'FIPS 140-2': 1}, 'PKCS': {'PKCS1': 12, 'PKCS5': 3, 'PKCS3': 1}, 'BSI': {'AIS20': 7, 'AIS31': 5, 'AIS 31': 2, 'AIS 20': 1}, 'RFC': {'RFC5639': 5, 'RFC 5639': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9796-2': 1}, 'SCP': {'SCP02': 4, 'SCP03': 3}, 'CC': {'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-001': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 7, 'javacard.framework': 5, 'javacard.framework.applet': 1}, 'javacardx': {'javacardx.crypto': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 5, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1, 'with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Veridos/Giesecke+Devrient MS Security Target Lite Sm@rtCafé® Expert 8.0 C1/Version 3': 1, '384, 521}r1[SEC2], brainpoolP{224, 256, 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Veridos/Giesecke+Devrient MS Security Target Lite Sm@rtCafé® Expert 8.0 C1/Version 3': 1, '4 [AIS20],[AIS31]12 that implements13: 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {'NL': {'CC-22-0289060': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL6': 1, 'EAL2': 1, 'EAL 7': 1, 'EAL6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1, 'ALC_FLR.3': 2}}, 'cc_sfr': {}, 'cc_claims': {'R': {'R.L': 1}}, 'vendor': {'GD': {'Giesecke+Devrient': 1}}, 'eval_facility': {'SGS': {'SGS': 1, 'SGS Brightsight': 1}, 'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408-1': 1, 'ISO/IEC 15408-2': 1, 'ISO/IEC 15408-3': 1, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to [ST-Lite][v31]Veridos_GDMS_8_0_C1_ASE_v31_Lite.pdf.
    • The cert_filename property was set to NSCIB-CC-0289060-Cert.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1107-V3-2022']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1107-V3-2022']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0289060-CR-1.0.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-Lite][v31]Veridos_GDMS_8_0_C1_ASE_v31_Lite.pdf.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-0568828-CR']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-0568828-CR']}} data.
    • The scheme_data property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The report_references property was updated, with the {'directly_referenced_by': None, 'indirectly_referenced_by': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}]} values discarded.
    • The scheme_data property was set to {'manufacturer': 'Veridos GmbH', 'product': 'Sm@rtCafé® Expert 8.0 C1', 'scheme': 'NSCIB', 'cert_id': 'CC-22-0289060', 'manufacturer_link': 'www.veridos.com', 'level': 'EAL6 augmented with ALC_FLR.1', 'cert_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-0289060-cert.pdf', 'report_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/nscib-cc-0289060-cr-1.0.pdf', 'target_link': 'https://www.tuv-nederland.nl/assets/files/cerfiticaten/2022/09/st-litev31veridos_gdms_8_0_c1_ase_v31_lite.pdf'}.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Veridos/Giesecke+Devrient MS Sm@rtCafé® Expert 8.0 C1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0289060-Cert.pdf",
  "dgst": "e59f251ffec9420e",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-0289060-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "8.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-0568828-CR"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-V3-2022"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-0568828-CR"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-V3-2022"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-V3-2022"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-V3-2022"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Veridos GmbH - Identity Solutions by Giesecke \u0026 Devrient and Bundesdruckerei",
  "manufacturer_web": "https://www.veridos.com",
  "name": "Veridos/Giesecke+Devrient MS Sm@rtCaf\u00e9\u00ae Expert 8.0 C1",
  "not_valid_after": "2027-09-01",
  "not_valid_before": "2022-09-01",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "NSCIB-CC-0289060-Cert.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "CC-22-0289060": 1
        }
      },
      "cc_claims": {
        "R": {
          "R.L": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.1": 1,
          "ALC_FLR.3": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 7": 1,
          "EAL2": 1,
          "EAL6": 1,
          "EAL6 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        },
        "SGS": {
          "SGS": 1,
          "SGS Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 1,
          "ISO/IEC 15408-2": 1,
          "ISO/IEC 15408-3": 1,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "Giesecke+Devrient": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "kruitr",
      "/CreationDate": "D:20220928162204+02\u002700\u0027",
      "/Creator": "Bullzip PDF Printer (11.0.0.2588)",
      "/ModDate": "D:20220928162236+02\u002700\u0027",
      "/Producer": "PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH",
      "/Title": "Microsoft Word - NSCIB-CC-0289060-Cert.doc",
      "pdf_file_size_bytes": 247691,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "NSCIB-CC-0289060-CR-1.0.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-0289060-CR",
        "cert_item": "Sm@rtCaf\u00e9\u00ae Expert 8.0 C1",
        "cert_lab": " SGS Brightsight B.V.",
        "developer": "Giesecke+Devrient Mobile Security GmbH"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 4
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 2
          },
          "EdDSA": {
            "EdDSA": 1
          }
        },
        "RSA": {
          "RSA-CRT": 2
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1107-V3-2022": 2
        },
        "NL": {
          "NSCIB-CC-0289060-CR": 13
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_IMP": 1
        },
        "ALC": {
          "ALC_FLR.1": 3
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL4": 1,
          "EAL5+": 1,
          "EAL6": 2,
          "EAL6 augmented": 2,
          "EAL6+": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 2
        },
        "SGS": {
          "SGS": 2,
          "SGS Brightsight": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side-channel": 1
        },
        "other": {
          "JIL": 2,
          "JIL-AAPS": 2,
          "JIL-AM": 2
        }
      },
      "standard_id": {
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 3,
            "CMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 2,
          "Giesecke+Devrient": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "JM2",
      "/CreationDate": "D:20220922114103+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/ModDate": "D:20220922114103+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 207268,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.tuv.com/nl",
          "http://www.commoncriteriaportal.org/",
          "mailto:[email protected]",
          "https://www.sogis.eu/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "[ST-Lite][v31]Veridos_GDMS_8_0_C1_ASE_v31_Lite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 9
          },
          "ECDH": {
            "ECDH": 9
          },
          "ECDSA": {
            "ECDSA": 8
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA-CRT": 12
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1107-": 1,
          "BSI-DSZ-CC-1107-V3-2022": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.CAP_FILE": 6,
          "A.DELETION": 7,
          "A.VERIFICATION": 6
        },
        "D": {
          "D.APP_CODE": 1,
          "D.APP_I_DATA": 2,
          "D.CRYPTO": 2,
          "D.PIN": 1,
          "D.SEC_DATA": 1
        },
        "O": {
          "O.AES": 1,
          "O.ALARM": 22,
          "O.APPLET": 16,
          "O.ARRAY_VIEWS_CONFID": 11,
          "O.ARRAY_VIEWS_INTEG": 9,
          "O.CARD-": 6,
          "O.CARD-MANAGEMENT": 27,
          "O.CIPHER": 15,
          "O.CODE_CAP": 1,
          "O.CODE_CAP_": 1,
          "O.CODE_CAP_FILE": 12,
          "O.DELETION": 17,
          "O.FIREWALL": 43,
          "O.GLOBAL_ARRAYS": 1,
          "O.GLOBAL_ARRAYS_CONFID": 19,
          "O.GLOBAL_ARRAYS_INTEG": 9,
          "O.INSTALL": 16,
          "O.JAVAOBJEC": 1,
          "O.JAVAOBJECT": 46,
          "O.KEY-": 8,
          "O.KEY-MNGT": 15,
          "O.LOAD": 19,
          "O.NATIVE": 14,
          "O.OBJ-DELETION": 9,
          "O.OPERATE": 36,
          "O.PIN-": 5,
          "O.PIN-MNGT": 18,
          "O.PINMNGT": 1,
          "O.REALLOCATION": 18,
          "O.RESOURCES": 23,
          "O.RND": 4,
          "O.RNG": 11,
          "O.SCP": 64,
          "O.SID": 33,
          "O.TDES": 2,
          "O.TRANSACTION": 19
        },
        "OE": {
          "OE.CAP_FILE": 9,
          "OE.CARD-MANAGEMENT": 6,
          "OE.CODE-": 5,
          "OE.CODE-EVIDENCE": 15,
          "OE.SCP": 13,
          "OE.VERIFICATION": 38
        },
        "OP": {
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 4,
          "OP.ARRAY_LENGTH": 4,
          "OP.ARRAY_T_ALOAD": 2,
          "OP.ARRAY_T_ASTORE": 3,
          "OP.ARRAY_T_LOAD": 1,
          "OP.CREATE": 7,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_CAP_FILE": 3,
          "OP.DELETE_CAP_FILE_APPLET": 3,
          "OP.INSTANCE_FIELD": 3,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 6,
          "OP.PUT": 5,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5
        },
        "OSP": {
          "OSP.VERIFICATION": 7
        },
        "R": {
          "R.JAVA": 14
        },
        "T": {
          "T.CONFID-": 8,
          "T.CONFID-APPLI-": 1,
          "T.CONFID-APPLI-DATA": 17,
          "T.CONFID-JCS-CODE": 3,
          "T.CONFID-JCS-DATA": 4,
          "T.DELETION": 4,
          "T.EXE-CODE": 6,
          "T.EXECODE": 1,
          "T.INSTALL": 5,
          "T.INTEG-": 10,
          "T.INTEG-APPLI-": 4,
          "T.INTEG-APPLI-CODE": 5,
          "T.INTEG-APPLI-DATA": 13,
          "T.INTEG-JCS-": 2,
          "T.INTEG-JCS-CODE": 4,
          "T.INTEG-JCS-DATA": 3,
          "T.INTEG-JCSCODE": 1,
          "T.INTEGAPPLI-CODE": 2,
          "T.INTEGAPPLI-DATA": 1,
          "T.INTEGJCS-DATA": 6,
          "T.NATIVE": 5,
          "T.OBJ-DELETION": 2,
          "T.OBJDELETION": 1,
          "T.PHYSICAL": 3,
          "T.RESOURCES": 7,
          "T.SECURE_DELETION": 8,
          "T.SID": 16
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0099-V2-2020": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 5,
          "ADV_ARC.1": 5,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 3,
          "ADV_FSP.5": 9,
          "ADV_IMP.1": 6,
          "ADV_IMP.2": 2,
          "ADV_INT.3": 1,
          "ADV_SPM.1": 3,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 3,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 6
        },
        "AGD": {
          "AGD_OPE.1": 7,
          "AGD_PRE.1": 5
        },
        "ALC": {
          "ALC_CMC.5": 3,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 4,
          "ALC_FLR.1": 6,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 3,
          "ASE_INT.2": 2,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 2,
          "ATE_COV.3": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6,
          "ATE_FUN.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4+": 1,
          "EAL 6": 3,
          "EAL 6 augmented": 2,
          "EAL 6+": 1,
          "EAL6": 4,
          "EAL6 augmented": 2,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 21,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 3,
          "FAU_SAS.1": 1
        },
        "FCO": {
          "FCO_NRO": 6,
          "FCO_NRO.2": 3
        },
        "FCS": {
          "FCS_CKM": 7,
          "FCS_CKM.1": 36,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 29,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 8,
          "FCS_COP.1": 118,
          "FCS_RNG": 5,
          "FCS_RNG.1": 13,
          "FCS_RNG.1.1": 5,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC": 30,
          "FDP_ACC.1": 11,
          "FDP_ACC.2": 5,
          "FDP_ACF": 29,
          "FDP_ACF.1": 13,
          "FDP_IFC": 31,
          "FDP_IFC.1": 13,
          "FDP_IFC.2": 2,
          "FDP_IFF": 23,
          "FDP_IFF.1": 17,
          "FDP_ITC": 12,
          "FDP_ITC.1": 8,
          "FDP_ITC.2": 20,
          "FDP_ITT.1": 1,
          "FDP_RIP": 139,
          "FDP_RIP.1": 11,
          "FDP_ROL": 16,
          "FDP_ROL.1": 5,
          "FDP_SDC.1": 2,
          "FDP_SDI": 15,
          "FDP_SDI.2": 4,
          "FDP_UIT": 9,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_API.1": 1,
          "FIA_ATD": 10,
          "FIA_ATD.1": 2,
          "FIA_UID": 16,
          "FIA_UID.1": 9,
          "FIA_UID.2": 1,
          "FIA_USB": 9,
          "FIA_USB.1": 3
        },
        "FMT": {
          "FMT_LIM": 4,
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MSA": 101,
          "FMT_MSA.1": 10,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 17,
          "FMT_MTD": 22,
          "FMT_MTD.1": 2,
          "FMT_MTD.3": 1,
          "FMT_SMF": 22,
          "FMT_SMF.1": 20,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 35,
          "FMT_SMR.1": 32,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 10,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 39,
          "FPT_FLS.1": 21,
          "FPT_FLS.1.1": 2,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 9,
          "FPT_PHP.3.1": 3,
          "FPT_RCV": 13,
          "FPT_RCV.3": 10,
          "FPT_TDC.1": 8,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 2,
          "FPT_TST.1": 9,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1,
          "FPT_TST.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC": 14,
          "FTP_ITC.1": 8,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {
        "OutOfScope": {
          "384, 521}r1[SEC2], brainpoolP{224, 256, 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Veridos/Giesecke+Devrient MS Security Target Lite Sm@rtCaf\u00e9\u00ae Expert 8.0 C1/Version 3": 1,
          "4 [AIS20],[AIS31]12 that implements13: 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10": 1,
          "a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
          "out of scope": 5,
          "with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Veridos/Giesecke+Devrient MS Security Target Lite Sm@rtCaf\u00e9\u00ae Expert 8.0 C1/Version 3": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CFB": {
          "CFB": 5
        },
        "CTR": {
          "CTR": 5
        },
        "ECB": {
          "ECB": 9
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 10
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          },
          "SHA2": {
            "SHA-224": 3,
            "SHA-256": 4,
            "SHA-384": 4,
            "SHA-512": 4
          },
          "SHA3": {
            "SHA-3": 1,
            "SHA-3-224": 3,
            "SHA-3-256": 3,
            "SHA-3-384": 2,
            "SHA-3-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "javacard": {
          "javacard.framework": 5,
          "javacard.framework.applet": 1,
          "javacard.security": 7
        },
        "javacardx": {
          "javacardx.crypto": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 2.2.2": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 4,
          "RNG": 19
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "physical tampering": 5
        },
        "SCA": {
          "Leak-Inherent": 2,
          "physical probing": 1
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 31": 2,
          "AIS20": 7,
          "AIS31": 5
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 186-4": 7,
          "FIPS 197": 10,
          "FIPS PUB 202": 4,
          "FIPS180-4": 3
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 7816": 2,
          "ISO/IEC 9796-2": 1
        },
        "PKCS": {
          "PKCS1": 12,
          "PKCS3": 1,
          "PKCS5": 3
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC5639": 5
        },
        "SCP": {
          "SCP02": 4,
          "SCP03": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 29
          }
        },
        "DES": {
          "3DES": {
            "3-DES": 7,
            "3DES": 3,
            "TDEA": 1,
            "TDES": 3,
            "Triple-DES": 4
          },
          "DES": {
            "DES": 14
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 10,
            "CMAC": 6
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "GD": {
          "G\u0026D": 10,
          "G+D": 6,
          "Giesecke+Devrient": 7
        },
        "Infineon": {
          "Infineon": 1,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "G+D MS / stut",
      "/Category": "Public",
      "/Chip": "SLC37GDA512",
      "/Comments": "Public",
      "/Company": "G+D Mobile Security GmbH",
      "/CreationDate": "D:20220831171648+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 22 f\u00fcr Word",
      "/HWManufacturer": "Infineon",
      "/Keywords": "Version 3.1/Status 31.08.2022",
      "/ModDate": "D:20220831172417+02\u002700\u0027",
      "/Producer": "Adobe PDF Library 22.1.149",
      "/ProductName": "Sm@rtCaf\u00e9\u00ae Expert 8.0 C1",
      "/SourceModified": "D:20220831151510",
      "/Subject": "Sm@rtCaf\u00e9\u00ae Expert 8.0 C1",
      "/TOE": "Sm@rtCaf\u00e9\u00ae Expert 8.0 C1",
      "/Title": "Veridos/Giesecke+Devrient MS Security Target Lite",
      "pdf_file_size_bytes": 1743509,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 133
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf",
        "pp_name": "Java Card System - Open Configuration Protection Profile"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0289060-CR-1.0.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "EAL6+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-Lite][v31]Veridos_GDMS_8_0_C1_ASE_v31_Lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4c4dc22dc6d8087dc2f7fe4efe6af3e80258fd1603d09577b5e8db7369231483",
      "txt_hash": "60f8537fffc5dc18864b142b2866103b4cd994b1aa3991b460402434bd4137ee"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a95e6047f43b5109782774ec2636bec797b30cd826809525a87e5bcf0b1f71f1",
      "txt_hash": "5a83272361f672e4785f161a6b03d1ff675b2522fd1dc7e296534a0ac7374342"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2dc2dcab9ed1e28f5fe68fcc9dd256f60ccb666d30d028a42d0c6e977c98dfcd",
      "txt_hash": "4c9dece3582a7a280307b4ca5b0fcf054d792b629ec8bc2622718e00cfd5ff02"
    }
  },
  "status": "active"
}