Giesecke+Devrient Sm@rtCafé® Expert 8.0 C2
CSV information
Status | active |
---|---|
Valid from | 24.05.2023 |
Valid until | 24.05.2028 |
Scheme | 🇳🇱 NL |
Manufacturer | G+D Mobile Security GmbH |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ALC_FLR.1, EAL6+ |
Protection profiles | |
Maintenance updates | NSCIB-CC-2300005-01-MA1 (18.09.2023) Certification report Security target |
Heuristics summary
Certificate
Extracted keywords
Vendor
Giesecke+DevrientSecurity level
EAL6, EAL2, EAL7, EAL6 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR.3, ALC_FLRProtection profiles
BSI-CC-PP-0099-V2-2020Certificates
NSCIB-CC-23-2300006-01, NSCIB-2300006-01, CC-22-0289065Evaluation facilities
SGS, SGS Brightsight, BrightsightStandards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008File metadata
Title | NSCIB Certificate |
---|---|
Author | Denise Cater |
Creation date | D:20230813222000+01'00' |
Modification date | D:20230813222000+01'00' |
Pages | 1 |
Creator | Microsoft® Word 2021 |
Producer | Microsoft® Word 2021 |
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, CMAC, CBC-MACAsymmetric Algorithms
RSA-PSS, RSA-CRT, ECDH, ECDSA, EdDSA, ECCHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512Schemes
MACRandomness
RNGBlock cipher modes
ECB, CBC, GCMVendor
Giesecke+Devrient, G&DSecurity level
EAL4, EAL6, EAL6+, EAL5+, EAL 6, EAL6 augmented, EAL 6 augmentedSecurity Assurance Requirements (SAR)
ADV_IMP, ALC_FLR.1, AVA_VAN.5, AVA_VANCertificates
BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300006-01-CR, NSCIB-2300006-01Evaluation facilities
SGS, SGS Brightsight, BrightsightSide-channel analysis
side-channel, JIL-AM, JIL-AAPS, JILStandards
ISO/IEC 7816, ISO/IEC 14443File metadata
Title | Certification Report |
---|---|
Author | JM2 |
Creation date | D:20230531214432+01'00' |
Modification date | D:20230531214432+01'00' |
Pages | 13 |
Creator | Microsoft® Word 2021 |
Producer | Microsoft® Word 2021 |
Frontpage
Certificate ID | NSCIB-CC-2300006-01-CR |
---|---|
Certified item | Sm@rtCafé® Expert 8.0 C2 |
Certification lab | SGS Brightsight B.V. |
Developer | Giesecke+Devrient Mobile Security GmbH |
References
Outgoing- BSI-DSZ-CC-1107-V3-2022 - active - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance
Security target
Extracted keywords
Symmetric Algorithms
AES, RC2, DES, 3DES, 3-DES, Triple-DES, TDES, TDEA, CBC-MAC, CMACAsymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3-224, SHA-3-256, SHA-3-384, SHA-3-512, SHA-3Schemes
MAC, Key AgreementRandomness
TRNG, RNG, RNDBlock cipher modes
ECB, CBC, CTR, CFBJavaCard versions
Java Card 2.2.2JavaCard API constants
TYPE_ACCESSVendor
Infineon Technologies AG, Infineon, Giesecke+Devrient, G+D, G&DSecurity level
EAL6+, EAL 6+, EAL6, EAL 4+, EAL 6, EAL6 augmented, EAL 6 augmentedClaims
D.APP_I_DATA, D.APP_CODE, D.SEC_DATA, D.PIN, D.CRYPTO, O.CARD-, O.SCP, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.ARRAY_VIEWS_CONFID, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.PIN-, O.ARRAY_VIEWS_INTEG, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, O.CODE_CAP_, O.CODE_CAP, O.JAVAOBJEC, O.GLOBAL_ARRAYS, O.KEY-, O.PINMNGT, O.RND, O.TDES, O.AES, T.SECURE_DELETION, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-APPLI-, T.INTEG-APPLI-, T.CONFID-, T.INTEGJCS-DATA, T.EXECODE, T.OBJDELETION, T.INTEG-, T.INTEGAPPLI-DATA, T.INTEGAPPLI-CODE, T.INTEG-JCS-, T.INTEG-JCSCODE, A.CAP_FILE, A.DELETION, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_T_LOAD, OP.ARRAY_T_ASTORE, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.ARRAY_T_ALOAD, OP.PUTFIELD, OP.PUTSTATIC, OP.PUT, OE.CARD-MANAGEMENT, OE.SCP, OE.CAP_FILE, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.CODE-, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_SPM.1, ADV_FSP.4, ADV_ARC, ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.5, ADV_IMP.1, ADV_IMP.2, ADV_TDS.3, ADV_INT.3, ADV_FSP.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_DVS.2, ALC_CMC.5, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.3, ATE_FUN.1, ATE_FUN.2, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_INT.2, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAS.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_CKM.2, FCS_CKM, FCS_COP, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_ITT.1, FDP_SDC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FIA_API.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FPR_UNO.1, FPR_UNO.1.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_PHP.3.1, FPT_TST.2, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.3, FTP_TRP.1Protection profiles
BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-1107-V3-2022Side-channel analysis
Leak-Inherent, physical probing, physical tampering, Malfunction, JILCertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are, with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05, 384, 521}r1[SEC2], brainpoolP{224, 256, 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05, 3 [AIS20],[AIS31]12 that implements13 : 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10Standards
FIPS 186-4, FIPS 197, FIPS180-4, FIPS PUB 202, FIPS 140-2, PKCS1, PKCS5, PKCS3, AIS20, AIS31, AIS 31, AIS 20, RFC5639, RFC 5639, RFC 4056, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9796-2, SCP02, SCP03, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-001File metadata
Title | Giesecke+Devrient MS Security Target |
---|---|
Subject | Sm@rtCafé® Expert 8.0 C2 |
Keywords | Version 4.0/Status 10.05.2023 |
Author | G+D MS / stut |
Creation date | D:20230510174501+02'00' |
Modification date | D:20230510174501+02'00' |
Pages | 134 |
Creator | Microsoft® Word für Microsoft 365 |
Producer | Microsoft® Word für Microsoft 365 |
References
Outgoing- BSI-DSZ-CC-1107-V3-2022 - active - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance
Heuristics
Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.2, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, AVA_VAN.5Similar certificates
Name | Certificate ID | |
---|---|---|
Veridos/Giesecke+Devrient Sm@rtCafé® Expert 8.0 C2 | NSCIB-CC-2300005-01-CR | Compare |
Scheme data ?
Cert Id | NSCIB-CC-23-2300006-01-CR | |
---|---|---|
Certification Date | 24.05.2023 | |
Status | Issued | |
Product | Sm@rtCafé® Expert 8.0 C2 | |
Developer | Giesecke+Devrient Mobile Security GmbH | |
Evaluation Facility | SGS Brightsight | |
Level | EAL6+ALC_FLR.1 | |
Cert Link | https://trustcb.com/download/?wpdmdl=3125 | |
Report Link | https://trustcb.com/download/?wpdmdl=2871 | |
Target Link | https://trustcb.com/download/?wpdmdl=2872 |
References
Updates
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': {'_type': 'Set', 'elements': ['7f886b64878b68c1']}, 'eal': 'EAL6+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
.
- The report property was updated, with the
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'NSCIB-CC-23-2300006-01-CR', 'certification_date': '2023-05-24', 'status': 'Issued', 'product': 'Sm@rtCafé® Expert 8.0 C2', 'developer': 'Giesecke+Devrient Mobile Security GmbH', 'evaluation_facility': 'SGS Brightsight', 'level': 'EAL6+ALC_FLR.1', 'cert_link': 'https://trustcb.com/download/?wpdmdl=3125', 'report_link': 'https://trustcb.com/download/?wpdmdl=2871', 'target_link': 'https://trustcb.com/download/?wpdmdl=2872'}
.
- The scheme_data property was set to
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card System - Open Configuration Protection Profile', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099V2b_pdf.pdf', 'pp_ids': None}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '05a09f1a425b868417ca32c9c1137e86c55ecf16bcd8cce8b9d52c7ddad03923', 'txt_hash': '84761c49289434f7f56a7ed000544e7461836bc71e215e5e25c49da18a93c6a0'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7cc659b7f807522c1eaf784f93aff2e3ebfe9a84260ae2a1927c32aca59b4720', 'txt_hash': '137fc6834184c4de3b6848693f210e24c159b0922fcb9a7fe0d29bd84c16718d'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1811883, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 134, '/Title': 'Giesecke+Devrient MS Security Target', '/Author': 'G+D MS / stut', '/Subject': 'Sm@rtCafé® Expert 8.0 C2', '/Keywords': 'Version 4.0/Status 10.05.2023', '/Creator': 'Microsoft® Word für Microsoft 365', '/CreationDate': "D:20230510174501+02'00'", '/ModDate': "D:20230510174501+02'00'", '/Producer': 'Microsoft® Word für Microsoft 365', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 94099, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'NSCIB Certificate', '/Author': 'Denise Cater', '/Creator': 'Microsoft® Word 2021', '/CreationDate': "D:20230813222000+01'00'", '/ModDate': "D:20230813222000+01'00'", '/Producer': 'Microsoft® Word 2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.tuv-nederland.nl/']}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1107-V3-2022': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-V2-2020': 2, 'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL6+': 1, 'EAL 6+': 1, 'EAL6': 4, 'EAL 4+': 1, 'EAL 6': 3, 'EAL6 augmented': 2, 'EAL 6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 3, 'ADV_FSP.4': 3, 'ADV_ARC': 5, 'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 9, 'ADV_TDS.5': 6, 'ADV_IMP.1': 6, 'ADV_IMP.2': 2, 'ADV_TDS.3': 3, 'ADV_INT.3': 1, 'ADV_FSP.2': 2, 'ADV_TDS.4': 1}, 'AGD': {'AGD_OPE.1': 7, 'AGD_PRE.1': 5}, 'ALC': {'ALC_FLR.1': 6, 'ALC_DVS.2': 4, 'ALC_CMC.5': 3, 'ALC_TAT.1': 2, 'ALC_TAT.2': 1, 'ALC_TAT.3': 2, 'ALC_CMS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_FUN.1': 6, 'ATE_FUN.2': 1, 'ATE_COV.1': 2, 'ATE_COV.2': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 3, 'ASE_REQ.1': 2, 'ASE_INT.2': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 21, 'FAU_ARP.1.1': 1, 'FAU_SAA.1': 3, 'FAU_SAS.1': 1}, 'FCO': {'FCO_NRO': 6, 'FCO_NRO.2': 3}, 'FCS': {'FCS_RNG': 5, 'FCS_RNG.1.1': 5, 'FCS_RNG.1': 13, 'FCS_RNG.1.2': 1, 'FCS_CKM.1': 36, 'FCS_CKM.4': 29, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 118, 'FCS_CKM.2': 4, 'FCS_CKM': 7, 'FCS_COP': 8}, 'FDP': {'FDP_ACC': 30, 'FDP_ACC.2': 5, 'FDP_ACF': 29, 'FDP_ACF.1': 13, 'FDP_IFC': 31, 'FDP_IFC.1': 13, 'FDP_IFF': 23, 'FDP_IFF.1': 17, 'FDP_RIP': 139, 'FDP_RIP.1': 11, 'FDP_ROL.1': 5, 'FDP_ROL': 16, 'FDP_SDI': 15, 'FDP_SDI.2': 4, 'FDP_ITC': 12, 'FDP_ITC.2': 20, 'FDP_IFC.2': 2, 'FDP_UIT': 9, 'FDP_UIT.1': 2, 'FDP_ACC.1': 11, 'FDP_ITC.1': 8, 'FDP_ITT.1': 1, 'FDP_SDC.1': 2}, 'FIA': {'FIA_ATD': 10, 'FIA_ATD.1': 2, 'FIA_UID': 16, 'FIA_UID.2': 1, 'FIA_USB': 9, 'FIA_USB.1': 3, 'FIA_UID.1': 9, 'FIA_API.1': 1}, 'FMT': {'FMT_MSA': 101, 'FMT_MSA.1': 10, 'FMT_MSA.2': 2, 'FMT_MSA.3': 17, 'FMT_SMF.1': 20, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 32, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 22, 'FMT_MTD.1': 2, 'FMT_MTD.3': 1, 'FMT_SMR': 35, 'FMT_SMF': 22, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_LIM': 4}, 'FPR': {'FPR_UNO.1': 10, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_PHP.3': 9, 'FPT_TST.1': 9, 'FPT_FLS.1': 21, 'FPT_FLS.1.1': 2, 'FPT_TDC.1': 8, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 39, 'FPT_RCV': 13, 'FPT_RCV.3': 10, 'FPT_PHP.3.1': 3, 'FPT_TST.2': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC': 14, 'FTP_ITC.1': 8, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.APP_I_DATA': 2, 'D.APP_CODE': 1, 'D.SEC_DATA': 1, 'D.PIN': 1, 'D.CRYPTO': 2}, 'O': {'O.CARD-': 6, 'O.SCP': 64, 'O.SID': 33, 'O.FIREWALL': 43, 'O.GLOBAL_ARRAYS_CONFID': 19, 'O.GLOBAL_ARRAYS_INTEG': 9, 'O.ARRAY_VIEWS_CONFID': 11, 'O.NATIVE': 14, 'O.OPERATE': 36, 'O.REALLOCATION': 18, 'O.RESOURCES': 23, 'O.ALARM': 22, 'O.CIPHER': 15, 'O.RNG': 11, 'O.KEY-MNGT': 15, 'O.PIN-MNGT': 18, 'O.TRANSACTION': 19, 'O.OBJ-DELETION': 9, 'O.DELETION': 17, 'O.LOAD': 19, 'O.INSTALL': 16, 'O.CARD-MANAGEMENT': 27, 'O.PIN-': 5, 'O.ARRAY_VIEWS_INTEG': 9, 'O.APPLET': 16, 'O.CODE_CAP_FILE': 12, 'O.JAVAOBJECT': 46, 'O.CODE_CAP_': 1, 'O.CODE_CAP': 1, 'O.JAVAOBJEC': 1, 'O.GLOBAL_ARRAYS': 1, 'O.KEY-': 8, 'O.PINMNGT': 1, 'O.RND': 4, 'O.TDES': 2, 'O.AES': 1}, 'T': {'T.SECURE_DELETION': 8, 'T.CONFID-APPLI-DATA': 17, 'T.CONFID-JCS-CODE': 3, 'T.CONFID-JCS-DATA': 4, 'T.INTEG-APPLI-CODE': 5, 'T.INTEG-APPLI-DATA': 13, 'T.INTEG-JCS-CODE': 4, 'T.INTEG-JCS-DATA': 3, 'T.SID': 16, 'T.EXE-CODE': 6, 'T.NATIVE': 5, 'T.RESOURCES': 7, 'T.DELETION': 4, 'T.INSTALL': 5, 'T.OBJ-DELETION': 2, 'T.PHYSICAL': 3, 'T.CONFID-APPLI-': 1, 'T.INTEG-APPLI-': 4, 'T.CONFID-': 8, 'T.INTEGJCS-DATA': 6, 'T.EXECODE': 1, 'T.OBJDELETION': 1, 'T.INTEG-': 10, 'T.INTEGAPPLI-DATA': 1, 'T.INTEGAPPLI-CODE': 2, 'T.INTEG-JCS-': 2, 'T.INTEG-JCSCODE': 1}, 'A': {'A.CAP_FILE': 6, 'A.DELETION': 7, 'A.VERIFICATION': 6}, 'R': {'R.JAVA': 14}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.ARRAY_LENGTH': 4, 'OP.ARRAY_T_LOAD': 1, 'OP.ARRAY_T_ASTORE': 3, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_CAP_FILE': 3, 'OP.DELETE_CAP_FILE_APPLET': 3, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 6, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.ARRAY_T_ALOAD': 2, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1, 'OP.PUT': 5}, 'OE': {'OE.CARD-MANAGEMENT': 6, 'OE.SCP': 13, 'OE.CAP_FILE': 9, 'OE.VERIFICATION': 38, 'OE.CODE-EVIDENCE': 15, 'OE.CODE-': 5}, 'OSP': {'OSP.VERIFICATION': 7}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 1}, 'GD': {'Giesecke+Devrient': 8, 'G+D': 6, 'G&D': 10}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 29}, 'RC': {'RC2': 1}}, 'DES': {'DES': {'DES': 14}, '3DES': {'3DES': 3, '3-DES': 7, 'Triple-DES': 4, 'TDES': 3, 'TDEA': 1}}, 'constructions': {'MAC': {'CBC-MAC': 10, 'CMAC': 6}}}, 'asymmetric_crypto': {'RSA': {'RSA-CRT': 12}, 'ECC': {'ECDH': {'ECDH': 9}, 'ECDSA': {'ECDSA': 8}, 'ECC': {'ECC': 9}}, 'FF': {'DH': {'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}, 'SHA2': {'SHA-224': 3, 'SHA-256': 4, 'SHA-384': 4, 'SHA-512': 4}, 'SHA3': {'SHA-3-224': 3, 'SHA-3-256': 3, 'SHA-3-384': 2, 'SHA-3-512': 3, 'SHA-3': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 10}, 'KA': {'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 17, 'RND': 4}}, 'cipher_mode': {'ECB': {'ECB': 9}, 'CBC': {'CBC': 6}, 'CTR': {'CTR': 5}, 'CFB': {'CFB': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 2, 'physical probing': 1}, 'FI': {'physical tampering': 5, 'Malfunction': 3}, 'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 186-4': 7, 'FIPS 197': 10, 'FIPS180-4': 3, 'FIPS PUB 202': 4, 'FIPS 140-2': 1}, 'PKCS': {'PKCS1': 12, 'PKCS5': 3, 'PKCS3': 1}, 'BSI': {'AIS20': 7, 'AIS31': 5, 'AIS 31': 2, 'AIS 20': 1}, 'RFC': {'RFC5639': 5, 'RFC 5639': 1, 'RFC 4056': 1}, 'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2, 'ISO/IEC 9796-2': 1}, 'SCP': {'SCP02': 4, 'SCP03': 3}, 'CC': {'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-001': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 5}}, 'javacard_packages': {'javacard': {'javacard.security': 7, 'javacard.framework': 5, 'javacard.framework.applet': 1}, 'javacardx': {'javacardx.crypto': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 5, 'a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are': 1, 'with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05': 1, '384, 521}r1[SEC2], brainpoolP{224, 256, 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05': 1, '3 [AIS20],[AIS31]12 that implements13 : 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {'NL': {'NSCIB-CC-23-2300006-01': 1, 'NSCIB-2300006-01': 1, 'CC-22-0289065': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-V2-2020': 1}}, 'cc_security_level': {'EAL': {'EAL6': 1, 'EAL2': 1, 'EAL7': 1, 'EAL6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1, 'ALC_FLR.3': 1, 'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'GD': {'Giesecke+Devrient': 1}}, 'eval_facility': {'SGS': {'SGS': 1, 'SGS Brightsight': 1}, 'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408-1': 2, 'ISO/IEC 18045': 4, 'ISO/IEC 18045:2008': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
NSCIB-CC-2300006-01-ST.pdf
. - The cert_filename property was set to
NSCIB-CC-2300006-01.1-Cert.pdf
.
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1107-V3-2022']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1107-V3-2022']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}
values added.
- The st property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01-CR.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01-ST.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '9b77ea82926915cc3f27368ed538089a22a11392a37f08c8e8a4548f953aa9ee', 'txt_hash': 'f0d695e11b298a8b2f64e76c50163b6f99decd4d2df10024e09511eea89b4c4e'}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 227923, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 13, '/Title': 'Certification Report', '/Author': 'JM2', '/Creator': 'Microsoft® Word 2021', '/CreationDate': "D:20230531214432+01'00'", '/ModDate': "D:20230531214432+01'00'", '/Producer': 'Microsoft® Word 2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://trustcb.com/common-criteria/nscib/', 'mailto:[email protected]', 'https://www.tuv-nederland.nl/common-criteria/certificates.html', 'https://www.sogis.eu/', 'http://www.commoncriteriaportal.org/']}}
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
{'NL': {'cert_id': 'NSCIB-CC-2300006-01-CR', 'cert_item': 'Sm@rtCafé® Expert 8.0 C2', 'developer': 'Giesecke+Devrient Mobile Security GmbH', 'cert_lab': ' SGS Brightsight B.V.'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-1107-V3-2022': 2}, 'NL': {'NSCIB-CC-2300006-01-CR': 13, 'NSCIB-2300006-01': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL6': 2, 'EAL6+': 4, 'EAL5+': 1, 'EAL 6': 1, 'EAL6 augmented': 2, 'EAL 6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_IMP': 1}, 'ALC': {'ALC_FLR.1': 3}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'GD': {'Giesecke+Devrient': 4, 'G&D': 4}}, 'eval_facility': {'SGS': {'SGS': 3, 'SGS Brightsight': 3}, 'BrightSight': {'Brightsight': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'DES': {'DES': 3}, '3DES': {'3DES': 2}}, 'constructions': {'MAC': {'CMAC': 2, 'CBC-MAC': 3}}}, 'asymmetric_crypto': {'RSA': {'RSA-PSS': 1, 'RSA-CRT': 2}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 2}, 'EdDSA': {'EdDSA': 1}, 'ECC': {'ECC': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 1, 'SHA-384': 1, 'SHA-512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 3}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'ECB': {'ECB': 3}, 'CBC': {'CBC': 3}, 'GCM': {'GCM': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side-channel': 1}, 'other': {'JIL-AM': 2, 'JIL-AAPS': 2, 'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 7816': 2, 'ISO/IEC 14443': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
None
. - The report_filename property was set to
NSCIB-CC-2300006-01-CR.pdf
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
['']
. - The cert_id property was set to
NSCIB-CC-2300006-01-CR
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1107-V3-2022']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1107-V3-2022']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Giesecke+Devrient Sm@rtCafé® Expert 8.0 C2 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01.1-Cert.pdf",
"dgst": "e9c4587f626324cd",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-2300006-01-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL6+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"8.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"7f886b64878b68c1"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1107-V3-2022"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1107-V3-2022"
]
}
},
"scheme_data": {
"cert_id": "NSCIB-CC-23-2300006-01-CR",
"cert_link": "https://trustcb.com/download/?wpdmdl=3125",
"certification_date": "2023-05-24",
"developer": "Giesecke+Devrient Mobile Security GmbH",
"evaluation_facility": "SGS Brightsight",
"level": "EAL6+ALC_FLR.1",
"product": "Sm@rtCaf\u00e9\u00ae Expert 8.0 C2",
"report_link": "https://trustcb.com/download/?wpdmdl=2871",
"status": "Issued",
"target_link": "https://trustcb.com/download/?wpdmdl=2872"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1107-V3-2022"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1107-V3-2022"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2023-09-18",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300005-01-MA1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300005-01-STv42.pdf",
"maintenance_title": "NSCIB-CC-2300005-01-MA1"
}
]
},
"manufacturer": "G+D Mobile Security GmbH",
"manufacturer_web": "https://www.gi-de.com/de/de/mobile-security/",
"name": "Giesecke+Devrient Sm@rtCaf\u00e9\u00ae Expert 8.0 C2",
"not_valid_after": "2028-05-24",
"not_valid_before": "2023-05-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "NSCIB-CC-2300006-01.1-Cert.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-22-0289065": 1,
"NSCIB-2300006-01": 1,
"NSCIB-CC-23-2300006-01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0099-V2-2020": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
},
"SGS": {
"SGS": 1,
"SGS Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 18045:2008": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"Giesecke+Devrient": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Denise Cater",
"/CreationDate": "D:20230813222000+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20230813222000+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "NSCIB Certificate",
"pdf_file_size_bytes": 94099,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.tuv-nederland.nl/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "NSCIB-CC-2300006-01-CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-2300006-01-CR",
"cert_item": "Sm@rtCaf\u00e9\u00ae Expert 8.0 C2",
"cert_lab": " SGS Brightsight B.V.",
"developer": "Giesecke+Devrient Mobile Security GmbH"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 2
},
"EdDSA": {
"EdDSA": 1
}
},
"RSA": {
"RSA-CRT": 2,
"RSA-PSS": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1107-V3-2022": 2
},
"NL": {
"NSCIB-2300006-01": 1,
"NSCIB-CC-2300006-01-CR": 13
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_IMP": 1
},
"ALC": {
"ALC_FLR.1": 3
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 1,
"EAL 6 augmented": 1,
"EAL4": 1,
"EAL5+": 1,
"EAL6": 2,
"EAL6 augmented": 2,
"EAL6+": 4
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 3
},
"SGS": {
"SGS": 3,
"SGS Brightsight": 3
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"SCA": {
"side-channel": 1
},
"other": {
"JIL": 2,
"JIL-AAPS": 2,
"JIL-AM": 2
}
},
"standard_id": {
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"3DES": 2
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"CBC-MAC": 3,
"CMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 4,
"Giesecke+Devrient": 4
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "JM2",
"/CreationDate": "D:20230531214432+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20230531214432+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "Certification Report",
"pdf_file_size_bytes": 227923,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"https://www.sogis.eu/",
"http://www.commoncriteriaportal.org/",
"https://www.tuv-nederland.nl/common-criteria/certificates.html",
"https://trustcb.com/common-criteria/nscib/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "NSCIB-CC-2300006-01-ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 9
},
"ECDH": {
"ECDH": 9
},
"ECDSA": {
"ECDSA": 8
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
}
},
"RSA": {
"RSA-CRT": 12
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1107-V3-2022": 2
}
},
"cc_claims": {
"A": {
"A.CAP_FILE": 6,
"A.DELETION": 7,
"A.VERIFICATION": 6
},
"D": {
"D.APP_CODE": 1,
"D.APP_I_DATA": 2,
"D.CRYPTO": 2,
"D.PIN": 1,
"D.SEC_DATA": 1
},
"O": {
"O.AES": 1,
"O.ALARM": 22,
"O.APPLET": 16,
"O.ARRAY_VIEWS_CONFID": 11,
"O.ARRAY_VIEWS_INTEG": 9,
"O.CARD-": 6,
"O.CARD-MANAGEMENT": 27,
"O.CIPHER": 15,
"O.CODE_CAP": 1,
"O.CODE_CAP_": 1,
"O.CODE_CAP_FILE": 12,
"O.DELETION": 17,
"O.FIREWALL": 43,
"O.GLOBAL_ARRAYS": 1,
"O.GLOBAL_ARRAYS_CONFID": 19,
"O.GLOBAL_ARRAYS_INTEG": 9,
"O.INSTALL": 16,
"O.JAVAOBJEC": 1,
"O.JAVAOBJECT": 46,
"O.KEY-": 8,
"O.KEY-MNGT": 15,
"O.LOAD": 19,
"O.NATIVE": 14,
"O.OBJ-DELETION": 9,
"O.OPERATE": 36,
"O.PIN-": 5,
"O.PIN-MNGT": 18,
"O.PINMNGT": 1,
"O.REALLOCATION": 18,
"O.RESOURCES": 23,
"O.RND": 4,
"O.RNG": 11,
"O.SCP": 64,
"O.SID": 33,
"O.TDES": 2,
"O.TRANSACTION": 19
},
"OE": {
"OE.CAP_FILE": 9,
"OE.CARD-MANAGEMENT": 6,
"OE.CODE-": 5,
"OE.CODE-EVIDENCE": 15,
"OE.SCP": 13,
"OE.VERIFICATION": 38
},
"OP": {
"OP.ARRAY_AASTORE": 3,
"OP.ARRAY_ACCESS": 4,
"OP.ARRAY_LENGTH": 4,
"OP.ARRAY_T_ALOAD": 2,
"OP.ARRAY_T_ASTORE": 3,
"OP.ARRAY_T_LOAD": 1,
"OP.CREATE": 7,
"OP.DELETE_APPLET": 4,
"OP.DELETE_CAP_FILE": 3,
"OP.DELETE_CAP_FILE_APPLET": 3,
"OP.INSTANCE_FIELD": 3,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 6,
"OP.PUT": 5,
"OP.PUTFIELD": 1,
"OP.PUTSTATIC": 1,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.VERIFICATION": 7
},
"R": {
"R.JAVA": 14
},
"T": {
"T.CONFID-": 8,
"T.CONFID-APPLI-": 1,
"T.CONFID-APPLI-DATA": 17,
"T.CONFID-JCS-CODE": 3,
"T.CONFID-JCS-DATA": 4,
"T.DELETION": 4,
"T.EXE-CODE": 6,
"T.EXECODE": 1,
"T.INSTALL": 5,
"T.INTEG-": 10,
"T.INTEG-APPLI-": 4,
"T.INTEG-APPLI-CODE": 5,
"T.INTEG-APPLI-DATA": 13,
"T.INTEG-JCS-": 2,
"T.INTEG-JCS-CODE": 4,
"T.INTEG-JCS-DATA": 3,
"T.INTEG-JCSCODE": 1,
"T.INTEGAPPLI-CODE": 2,
"T.INTEGAPPLI-DATA": 1,
"T.INTEGJCS-DATA": 6,
"T.NATIVE": 5,
"T.OBJ-DELETION": 2,
"T.OBJDELETION": 1,
"T.PHYSICAL": 3,
"T.RESOURCES": 7,
"T.SECURE_DELETION": 8,
"T.SID": 16
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-CC-PP-0099-V2-2020": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 5,
"ADV_ARC.1": 5,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 3,
"ADV_FSP.5": 9,
"ADV_IMP.1": 6,
"ADV_IMP.2": 2,
"ADV_INT.3": 1,
"ADV_SPM.1": 3,
"ADV_TDS.1": 2,
"ADV_TDS.3": 3,
"ADV_TDS.4": 1,
"ADV_TDS.5": 6
},
"AGD": {
"AGD_OPE.1": 7,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.5": 3,
"ALC_CMS.1": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR.1": 6,
"ALC_LCD.1": 3,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 2
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 3,
"ASE_INT.2": 2,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 2,
"ATE_COV.3": 1,
"ATE_DPT.1": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 6,
"ATE_FUN.2": 1
},
"AVA": {
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4+": 1,
"EAL 6": 3,
"EAL 6 augmented": 2,
"EAL 6+": 1,
"EAL6": 4,
"EAL6 augmented": 2,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 21,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 3,
"FAU_SAS.1": 1
},
"FCO": {
"FCO_NRO": 6,
"FCO_NRO.2": 3
},
"FCS": {
"FCS_CKM": 7,
"FCS_CKM.1": 36,
"FCS_CKM.2": 4,
"FCS_CKM.4": 29,
"FCS_CKM.4.1": 1,
"FCS_COP": 8,
"FCS_COP.1": 118,
"FCS_RNG": 5,
"FCS_RNG.1": 13,
"FCS_RNG.1.1": 5,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC": 30,
"FDP_ACC.1": 11,
"FDP_ACC.2": 5,
"FDP_ACF": 29,
"FDP_ACF.1": 13,
"FDP_IFC": 31,
"FDP_IFC.1": 13,
"FDP_IFC.2": 2,
"FDP_IFF": 23,
"FDP_IFF.1": 17,
"FDP_ITC": 12,
"FDP_ITC.1": 8,
"FDP_ITC.2": 20,
"FDP_ITT.1": 1,
"FDP_RIP": 139,
"FDP_RIP.1": 11,
"FDP_ROL": 16,
"FDP_ROL.1": 5,
"FDP_SDC.1": 2,
"FDP_SDI": 15,
"FDP_SDI.2": 4,
"FDP_UIT": 9,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_API.1": 1,
"FIA_ATD": 10,
"FIA_ATD.1": 2,
"FIA_UID": 16,
"FIA_UID.1": 9,
"FIA_UID.2": 1,
"FIA_USB": 9,
"FIA_USB.1": 3
},
"FMT": {
"FMT_LIM": 4,
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA": 101,
"FMT_MSA.1": 10,
"FMT_MSA.2": 2,
"FMT_MSA.3": 17,
"FMT_MTD": 22,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_SMF": 22,
"FMT_SMF.1": 20,
"FMT_SMF.1.1": 1,
"FMT_SMR": 35,
"FMT_SMR.1": 32,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 10,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 39,
"FPT_FLS.1": 21,
"FPT_FLS.1.1": 2,
"FPT_ITT.1": 1,
"FPT_PHP.3": 9,
"FPT_PHP.3.1": 3,
"FPT_RCV": 13,
"FPT_RCV.3": 10,
"FPT_TDC.1": 8,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 2,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1,
"FPT_TST.2": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 14,
"FTP_ITC.1": 8,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"3 [AIS20],[AIS31]12 that implements13 : 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10": 1,
"384, 521}r1[SEC2], brainpoolP{224, 256, 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCaf\u00e9\u00ae Expert 8.0 C2/Version 4.0/Status 10.05": 1,
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
"out of scope": 5,
"with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Giesecke+Devrient MS Security Target Sm@rtCaf\u00e9\u00ae Expert 8.0 C2/Version 4.0/Status 10.05": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"CFB": {
"CFB": 5
},
"CTR": {
"CTR": 5
},
"ECB": {
"ECB": 9
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 10
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 4,
"SHA-384": 4,
"SHA-512": 4
},
"SHA3": {
"SHA-3": 1,
"SHA-3-224": 3,
"SHA-3-256": 3,
"SHA-3-384": 2,
"SHA-3-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"javacard": {
"javacard.framework": 5,
"javacard.framework.applet": 1,
"javacard.security": 7
},
"javacardx": {
"javacardx.crypto": 1
}
},
"javacard_version": {
"JavaCard": {
"Java Card 2.2.2": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 4,
"RNG": 17
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"physical tampering": 5
},
"SCA": {
"Leak-Inherent": 2,
"physical probing": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 31": 2,
"AIS20": 7,
"AIS31": 5
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2
},
"FIPS": {
"FIPS 140-2": 1,
"FIPS 186-4": 7,
"FIPS 197": 10,
"FIPS PUB 202": 4,
"FIPS180-4": 3
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816": 2,
"ISO/IEC 9796-2": 1
},
"PKCS": {
"PKCS1": 12,
"PKCS3": 1,
"PKCS5": 3
},
"RFC": {
"RFC 4056": 1,
"RFC 5639": 1,
"RFC5639": 5
},
"SCP": {
"SCP02": 4,
"SCP03": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 29
},
"RC": {
"RC2": 1
}
},
"DES": {
"3DES": {
"3-DES": 7,
"3DES": 3,
"TDEA": 1,
"TDES": 3,
"Triple-DES": 4
},
"DES": {
"DES": 14
}
},
"constructions": {
"MAC": {
"CBC-MAC": 10,
"CMAC": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 10,
"G+D": 6,
"Giesecke+Devrient": 8
},
"Infineon": {
"Infineon": 1,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "G+D MS / stut",
"/CreationDate": "D:20230510174501+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word f\u00fcr Microsoft 365",
"/Keywords": "Version 4.0/Status 10.05.2023",
"/ModDate": "D:20230510174501+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word f\u00fcr Microsoft 365",
"/Subject": "Sm@rtCaf\u00e9\u00ae Expert 8.0 C2",
"/Title": "Giesecke+Devrient MS Security Target",
"pdf_file_size_bytes": 1811883,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 134
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01-CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL6+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01-ST.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7cc659b7f807522c1eaf784f93aff2e3ebfe9a84260ae2a1927c32aca59b4720",
"txt_hash": "137fc6834184c4de3b6848693f210e24c159b0922fcb9a7fe0d29bd84c16718d"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "9b77ea82926915cc3f27368ed538089a22a11392a37f08c8e8a4548f953aa9ee",
"txt_hash": "f0d695e11b298a8b2f64e76c50163b6f99decd4d2df10024e09511eea89b4c4e"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "05a09f1a425b868417ca32c9c1137e86c55ecf16bcd8cce8b9d52c7ddad03923",
"txt_hash": "84761c49289434f7f56a7ed000544e7461836bc71e215e5e25c49da18a93c6a0"
}
},
"status": "active"
}