This page was not yet optimized for use on mobile
devices.
Pasaporte electrónico versión 4.0
CSV information
| Status | active |
|---|---|
| Valid from | 28.04.2024 |
| Valid until | 28.04.2029 |
| Scheme | 🇪🇸 ES |
| Manufacturer | FNMT-RCM |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VAN.5, ATE_DPT.2, ALC_DVS.2, EAL4+ |
| Protection profiles |
|
| Maintenance updates | DNIe version 4.01 (29.07.2024) Certification report Security target |
Heuristics summary
Certificate ID: 2018-70-INF-4292
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 2, EAL4Claims
O.E, T.ISecurity Assurance Requirements (SAR)
ALC_FLR, ALC_DVS.2, ATE_DPT.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0056-V2-2012, BSI-CC-PP- 0086, BSI-CC-PP-0068-V2-2011-MA-01Evaluation facilities
Applus LaboratoriesCertification report
Extracted keywords
Protocols
PACEVendor
Idemia, Sagem, MorphoSecurity level
EAL4, EAL 1, EAL 4, EAL 2, EAL2, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_ARC, AGD_OPE.1, ALC_DVS.2, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_FLR, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2Security Functional Requirements (SFR)
FAU_SAS, FCS_CKM, FCS_COP, FCS_RND, FDP_ACC, FDP_ACF, FDP_DAU, FDP_IFC, FDP_IFF, FDP_RIP, FDP_SDI, FDP_UCT, FDP_UIT, FIA_AFL, FIA_API, FIA_UAU, FIA_UID, FMT_LIM, FMT_MOF, FMT_MSA, FMT_MTD, FMT_SMF, FMT_SMR.1, FMT_SMR, FPT_EMS, FPT_FLS, FPT_PHP, FPT_TST, FTP_ITCProtection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0071, BSI-CC-PP-0072, BSI-CC-PP-0056-V2-2012, BSI-CC-PP- 0086, BSI-CC-PP-0068-V2-2011-Certificates
2018-70-INF-4292- v1Evaluation facilities
Applus LaboratoriesSide-channel analysis
JILTechnical reports
BSI TR-03110File metadata
| Pages | 17 |
|---|
Security target
Extracted keywords
Symmetric Algorithms
AES-192, AES, DES, 3DES, Triple-DES, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-224, SHA-256Schemes
MAC, Key AgreementProtocols
PACEElliptic Curves
P-256, P-384, P-521, NIST P-256, NIST P-384, NIST P-521, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1Block cipher modes
CBCIC data groups
EF.DG3, EF.DG4, EF.DG14, EF.DG1, EF.DG16, EF.DG2, EF.DG22, EF.COM, EF.SOD, EF.ChipSecurityVendor
NXP Semiconductors, Infineon Technologies AGSecurity level
EAL4, EAL4+, EAL4 augmentedClaims
A.CGA, A.SCA, OE.HID_VAD, OE.HI_VADSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_PRE.1, AGD_OPE.1, ALC_DVS.2, ALC_DEL.1, ALC_CMC.4, ALC_CMS.4, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.5, APE_ECD, ASE_COMP, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_GEN, FAU_SAS.1.1, FCS_RND.1, FCS_RND, FCS_CKM.1, FCS_RND.1.1, FCS_CKM, FCS_COP, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FDP_ACF, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_RIP, FDP_ACC.1, FDP_ACC, FDP_IFC, FDP_IFF.1, FDP_IFF, FDP_IFC.1, FDP_RIP.1, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FDP_DAU, FDP_DAU.1, FDP_DAU.2, FDP_MTD, FIA_SOS.2, FIA_API.1, FIA_API, FIA_API.1.1, FIA_AFL, FIA_UID, FIA_UAU, FIA_UAU.1, FIA_AFL.1, FIA_UID.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MSA.3, FMT_MSA, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF, FMT_SMF.1, FMT_SMR, FMT_MTD.1, FMT_MTD.3, FMT_MOF, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.4, FPT_EMS.1, FPT_EMS, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST, FPT_ITC, FPT_ITC.1, FPT_FLS, FPT_FLS.1, FPT_TST.1, FPT_PHP, FPT_PHP.3, FPT_PHP.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0071, BSI-CC-PP-0072, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0086, BSI-CC-PP- 0068-V2-2011-MA-01, BSI-CC-PP-0087-V2-MA-01, BSI-CC-PP-0090-2016, BSI-CC-PP-0055-2009, BSI-CC-PP-0084-, BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0059-2009-, BSI-CC-PP- 0071Evaluation facilities
Applus LaboratoriesSide-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, Physical tampering, physical tampering, Malfunction, malfunction, fault injection, reverse engineeringCertification process
out of scope, the life-cycle phase operational use by a secure update mechanism. The updated TOE software is out of scope of this ST as it will be a different version of the TOE. Phase 5: End of life Step 8 The TOEStandards
FIPS 186-4, FIPS 140-2, NIST SP 800-186, NIST SP 800-90A, PKCS#1, PKCS#3, RFC5639, RFC 2631, RFC 3447, RFC 3447111, RFC 5639, ISO/IEC 7816, ISO/IEC 11770-3, ISO/IEC 15946-1, ICAO, ICAO-SACTechnical reports
BSI TR-03110File metadata
| Pages | 203 |
|---|
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
2018-70-INF-4292Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Scheme data
| Product | Pasaporte electrónico versión 4.0 / DNIe versión 4.01 | |
|---|---|---|
| Product Link | https://oc.ccn.cni.es/en/certified-products/certified-products/1009-pasaporte-electronico-version-4-0-dnie-version-4-01 | |
| Category | Smart Cards and similiar devicesQSCD/SSCD | |
| Manufacturer | FNMT-RCM | |
| Certification Date | 28.04.2024 | |
| Enhanced | ||
| Description | El TOE es una libreta con funcionalidades de documento de viaje. El TOE está compuesto de un chip previamente certificado (que proporciona la librería criptográfica y el firmware con el loader para la actualización del código), el sistema operativo y las librerías biométricas. Esta libreta implementa un sistema de ficheros que incluye las siguientes aplicaciones: eSign (aplicación de firma). eID (aplicación de identificación). ePass (aplicación de pasaporte). Mantenimiento DNIe 4.01 (29/07/2024): De acuerdo a los requisitos del CCRA (Common Criteria Recognition Arrangement) para continuidad de las garantías de seguridad y considerando el Informe de Análisis de Impacto proporcionado por la empresa Fábrica Nacional de Moneda y Timbre - Real Casa de Ia Moneda, la versión del TOE DNIe 4.01, considerando la naturaleza de los cambios, la conclusión es clasificar éstos como cambios menores y por tanto se lleva a cabo el mantenimiento del certificado como garantía de continuidad de la seguridad del producto. Los únicos cambios declarados por el solicitante con respecto a la certificación del producto Pasaporte electrónico versión 4 .0 son: Se han modificado los bytes históricos 3, 4, 5 y 6, que identifican el TOE en el ATR y ATS y el identificador WINDOWS SMARTCARD FRAMEWORK CARD IDENTIFIER pasando de denominarse ‘MRTD’ a ‘DNIe’. La versión del sistema operativo sigue siendo la misma 5.52. Se ha modificado la definición de compilación condicional a “DNIe_5_52”. Se han actualizado de los scripts de pre-personalización y personalización reflejando en la nomenclatura de los mismos la nueva versión a DNIe 4.01. Se han modificado las guías para introducir la nueva denominación del TOE. El punto de partida para la valoración del mantenimiento ha sido el Informe de Certificación INF-4292, la Declaración de Seguridad y el Informe Técnico de Evaluación EXT-8912 del producto Pasaporte electrónico versión 4 .0 con certificado referencia CCN-CC-5/2024, con número de expediente 2018-70, así como la Declaración de Seguridad modificada con motivo del mantenimiento realizado con número de expediente 2024-41 y su correspondiente Informe de Análisis de Impacto. El TOE DNIe 4.01 es una tarjeta inteligente que proporciona las funcionalidades de firma, identificación y documento de viaje. Esta tarjeta está compuesta por un chip previamente certificado (que proporciona la librería criptográfica y el firmware con el loader para la actualización del código), el sistema operativo y las librerías biométricas. | |
| Category | Smart Cards and similiar devices | |
| Manufacturer | FNMT-RCM | |
| Type | Product | |
| Evaluation Facility | Applus Laboratories | |
| Status | Certified | |
| Certification Date | 29.07.2024 | |
| Cc Version | Common Criteria 3.1 release 5 | |
| Level | EAL4 + ALC_DVS.2 + ATE_DPT.2 + AVA_VAN.5 | |
| Target Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2029 | |
| Cert Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1971 | |
| Report Link | https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1982 | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-70_Certificado_CC.pdf",
"dgst": "9c5baa7237068051",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "2018-70-INF-4292",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"d918b28fd7bb5d79",
"1f7ea2e05de5b88b",
"b380aabf93b29692",
"a33327d40f253f46",
"d9553e7194783182"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Smart Cards and similiar devicesQSCD/SSCD",
"certification_date": "2024-04-28",
"enhanced": {
"category": "Smart Cards and similiar devices",
"cc_version": "Common Criteria 3.1 release 5",
"cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1971",
"certification_date": "2024-07-29",
"description": "El TOE es una libreta con funcionalidades de documento de viaje. El TOE est\u00e1 compuesto de un chip previamente certificado (que proporciona la librer\u00eda criptogr\u00e1fica y el firmware con el loader para la actualizaci\u00f3n del c\u00f3digo), el sistema operativo y las librer\u00edas biom\u00e9tricas. Esta libreta implementa un sistema de ficheros que incluye las siguientes aplicaciones: eSign (aplicaci\u00f3n de firma). eID (aplicaci\u00f3n de identificaci\u00f3n). ePass (aplicaci\u00f3n de pasaporte). Mantenimiento DNIe 4.01 (29/07/2024): De acuerdo a los requisitos del CCRA (Common Criteria Recognition Arrangement) para continuidad de las garant\u00edas de seguridad y considerando el Informe de An\u00e1lisis de Impacto proporcionado por la empresa F\u00e1brica Nacional de Moneda y Timbre - Real Casa de Ia Moneda, la versi\u00f3n del TOE DNIe 4.01, considerando la naturaleza de los cambios, la conclusi\u00f3n es clasificar \u00e9stos como cambios menores y por tanto se lleva a cabo el mantenimiento del certificado como garant\u00eda de continuidad de la seguridad del producto. Los \u00fanicos cambios declarados por el solicitante con respecto a la certificaci\u00f3n del producto Pasaporte electr\u00f3nico versi\u00f3n 4 .0 son: Se han modificado los bytes hist\u00f3ricos 3, 4, 5 y 6, que identifican el TOE en el ATR y ATS y el identificador WINDOWS SMARTCARD FRAMEWORK CARD IDENTIFIER pasando de denominarse \u2018MRTD\u2019 a \u2018DNIe\u2019. La versi\u00f3n del sistema operativo sigue siendo la misma 5.52. Se ha modificado la definici\u00f3n de compilaci\u00f3n condicional a \u201cDNIe_5_52\u201d. Se han actualizado de los scripts de pre-personalizaci\u00f3n y personalizaci\u00f3n reflejando en la nomenclatura de los mismos la nueva versi\u00f3n a DNIe 4.01. Se han modificado las gu\u00edas para introducir la nueva denominaci\u00f3n del TOE. El punto de partida para la valoraci\u00f3n del mantenimiento ha sido el Informe de Certificaci\u00f3n INF-4292, la Declaraci\u00f3n de Seguridad y el Informe T\u00e9cnico de Evaluaci\u00f3n EXT-8912 del producto Pasaporte electr\u00f3nico versi\u00f3n 4 .0 con certificado referencia CCN-CC-5/2024, con n\u00famero de expediente 2018-70, as\u00ed como la Declaraci\u00f3n de Seguridad modificada con motivo del mantenimiento realizado con n\u00famero de expediente 2024-41 y su correspondiente Informe de An\u00e1lisis de Impacto. El TOE DNIe 4.01 es una tarjeta inteligente que proporciona las funcionalidades de firma, identificaci\u00f3n y documento de viaje. Esta tarjeta est\u00e1 compuesta por un chip previamente certificado (que proporciona la librer\u00eda criptogr\u00e1fica y el firmware con el loader para la actualizaci\u00f3n del c\u00f3digo), el sistema operativo y las librer\u00edas biom\u00e9tricas.",
"evaluation_facility": "Applus Laboratories",
"level": "EAL4 + ALC_DVS.2 + ATE_DPT.2 + AVA_VAN.5",
"manufacturer": "FNMT-RCM",
"report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=1982",
"status": "Certified",
"target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2029",
"type": "Product"
},
"manufacturer": "FNMT-RCM",
"product": "Pasaporte electr\u00f3nico versi\u00f3n 4.0 / DNIe versi\u00f3n 4.01",
"product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/1009-pasaporte-electronico-version-4-0-dnie-version-4-01"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2024-07-29",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Maintenance%20Report.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2024-41%20ST_lite.pdf",
"maintenance_title": "DNIe version 4.01"
}
]
},
"manufacturer": "FNMT-RCM",
"manufacturer_web": "https://www.fnmt.es",
"name": "Pasaporte electr\u00f3nico versi\u00f3n 4.0",
"not_valid_after": "2029-04-28",
"not_valid_before": "2024-04-28",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "2018-70_Certificado_CC.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.E": 1
},
"T": {
"T.I": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0086": 1,
"BSI-CC-PP-0056-V2-2012": 1,
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0068-V2-2011-MA-01": 1,
"BSI-CC-PP-0071-2012-MA-01": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1
},
"ATE": {
"ATE_DPT.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "2018-70_INF-4292.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"ES": {
"2018-70-INF-4292- v1": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0086": 2,
"BSI-CC-PP-0056-V2-2012": 2,
"BSI-CC-PP-0059-2009-MA-01": 3,
"BSI-CC-PP-0068-V2-2011-": 3,
"BSI-CC-PP-0071": 3,
"BSI-CC-PP-0072": 3
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_IMP.1": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 8,
"ALC_FLR": 3,
"ALC_LCD.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.2": 8,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 9
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 2": 1,
"EAL 4": 2,
"EAL2": 1,
"EAL4": 8
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 3
},
"FCS": {
"FCS_CKM": 16,
"FCS_COP": 17,
"FCS_RND": 2
},
"FDP": {
"FDP_ACC": 6,
"FDP_ACF": 7,
"FDP_DAU": 1,
"FDP_IFC": 1,
"FDP_IFF": 1,
"FDP_RIP": 4,
"FDP_SDI": 2,
"FDP_UCT": 2,
"FDP_UIT": 3
},
"FIA": {
"FIA_AFL": 7,
"FIA_API": 3,
"FIA_UAU": 13,
"FIA_UID": 5
},
"FMT": {
"FMT_LIM": 6,
"FMT_MOF": 1,
"FMT_MSA": 5,
"FMT_MTD": 27,
"FMT_SMF": 4,
"FMT_SMR": 3,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_EMS": 4,
"FPT_FLS": 4,
"FPT_PHP": 4,
"FPT_TST": 4
},
"FTP": {
"FTP_ITC": 7
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 6
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"Applus": {
"Applus Laboratories": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 3
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"Idemia": 2
},
"Morpho": {
"Morpho": 2
},
"Sagem": {
"Sagem": 4
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 355319,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "2018-70_ST-lite.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 8
},
"ECDSA": {
"ECDSA": 5
}
},
"FF": {
"DH": {
"DH": 3,
"Diffie-Hellman": 12
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CGA": 1,
"A.SCA": 1
},
"OE": {
"OE.HID_VAD": 3,
"OE.HI_VAD": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0068-V2-2011-MA-01": 1,
"BSI-CC-PP- 0071": 1,
"BSI-CC-PP-0055-2009": 1,
"BSI-CC-PP-0056-V2-2012": 2,
"BSI-CC-PP-0059-2009-": 1,
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0059-2009-MA-02": 1,
"BSI-CC-PP-0068-V2-2011-MA-01": 1,
"BSI-CC-PP-0071": 1,
"BSI-CC-PP-0071-2012-MA-01": 1,
"BSI-CC-PP-0072": 2,
"BSI-CC-PP-0072-2012-MA-01": 1,
"BSI-CC-PP-0084-": 1,
"BSI-CC-PP-0086": 2,
"BSI-CC-PP-0087-V2-MA-01": 2,
"BSI-CC-PP-0090-2016": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 5,
"ADV_FSP.4": 3,
"ADV_IMP.1": 3,
"ADV_TDS.3": 5
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 3,
"ALC_DVS.2": 7,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"APE": {
"APE_ECD": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_COMP": 2,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 8,
"ATE_FUN.1": 3,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 7
}
},
"cc_security_level": {
"EAL": {
"EAL4": 12,
"EAL4 augmented": 1,
"EAL4+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 9,
"FAU_SAS.1": 10,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM": 76,
"FCS_CKM.1": 38,
"FCS_CKM.2": 12,
"FCS_CKM.4": 36,
"FCS_COP": 37,
"FCS_COP.1": 31,
"FCS_RND": 9,
"FCS_RND.1": 8,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC": 28,
"FDP_ACC.1": 18,
"FDP_ACF": 39,
"FDP_ACF.1": 52,
"FDP_DAU": 2,
"FDP_DAU.1": 1,
"FDP_DAU.2": 2,
"FDP_IFC": 2,
"FDP_IFC.1": 10,
"FDP_IFF": 3,
"FDP_IFF.1": 11,
"FDP_ITC.1": 23,
"FDP_ITC.2": 24,
"FDP_MTD": 1,
"FDP_RIP": 19,
"FDP_RIP.1": 4,
"FDP_SDI": 2,
"FDP_SDI.1": 2,
"FDP_SDI.2": 4,
"FDP_UCT": 3,
"FDP_UCT.1": 1,
"FDP_UIT": 4,
"FDP_UIT.1": 4
},
"FIA": {
"FIA_AFL": 20,
"FIA_AFL.1": 15,
"FIA_API": 15,
"FIA_API.1": 9,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU": 53,
"FIA_UAU.1": 18,
"FIA_UAU.4": 3,
"FIA_UAU.5": 11,
"FIA_UAU.6": 3,
"FIA_UID": 24,
"FIA_UID.1": 21
},
"FMT": {
"FMT_LIM": 25,
"FMT_LIM.1": 14,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 13,
"FMT_LIM.2.1": 1,
"FMT_MOF": 1,
"FMT_MOF.1": 1,
"FMT_MSA": 21,
"FMT_MSA.1": 4,
"FMT_MSA.2": 1,
"FMT_MSA.3": 8,
"FMT_MSA.4": 1,
"FMT_MTD": 53,
"FMT_MTD.1": 26,
"FMT_MTD.3": 3,
"FMT_SMF": 29,
"FMT_SMF.1": 29,
"FMT_SMR": 40,
"FMT_SMR.1": 47,
"FMT_SMR.1.1": 3,
"FMT_SMR.1.2": 3
},
"FPT": {
"FPT_EMS": 14,
"FPT_EMS.1": 20,
"FPT_EMS.1.1": 2,
"FPT_EMS.1.2": 2,
"FPT_FLS": 7,
"FPT_FLS.1": 5,
"FPT_ITC": 2,
"FPT_ITC.1": 1,
"FPT_PHP": 7,
"FPT_PHP.1": 2,
"FPT_PHP.3": 3,
"FPT_TST": 11,
"FPT_TST.1": 13
},
"FTP": {
"FTP_ITC": 19,
"FTP_ITC.1": 32,
"FTP_TRP.1": 3
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"the life-cycle phase operational use by a secure update mechanism. The updated TOE software is out of scope of this ST as it will be a different version of the TOE. Phase 5: End of life Step 8 The TOE": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 162
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 2
},
"MAC": {
"MAC": 12
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 7,
"brainpoolP384r1": 7,
"brainpoolP512r1": 7
},
"NIST": {
"NIST P-256": 6,
"NIST P-384": 6,
"NIST P-521": 5,
"P-256": 8,
"P-384": 8,
"P-521": 7
}
},
"eval_facility": {
"Applus": {
"Applus Laboratories": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 8
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 1,
"EF.ChipSecurity": 1,
"EF.DG1": 7,
"EF.DG14": 4,
"EF.DG16": 4,
"EF.DG2": 1,
"EF.DG22": 2,
"EF.DG3": 4,
"EF.DG4": 4,
"EF.SOD": 6
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 1,
"Physical Tampering": 2,
"Physical tampering": 2,
"fault injection": 1,
"malfunction": 4,
"physical tampering": 11
},
"SCA": {
"DPA": 4,
"SPA": 3,
"physical probing": 3,
"timing attacks": 2
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"FIPS": {
"FIPS 140-2": 2,
"FIPS 186-4": 2
},
"ICAO": {
"ICAO": 4,
"ICAO-SAC": 3
},
"ISO": {
"ISO/IEC 11770-3": 1,
"ISO/IEC 15946-1": 1,
"ISO/IEC 7816": 2
},
"NIST": {
"NIST SP 800-186": 5,
"NIST SP 800-90A": 1
},
"PKCS": {
"PKCS#1": 3,
"PKCS#3": 1
},
"RFC": {
"RFC 2631": 1,
"RFC 3447": 1,
"RFC 3447111": 1,
"RFC 5639": 1,
"RFC5639": 8
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 27,
"AES-192": 1
}
},
"DES": {
"3DES": {
"3DES": 4,
"Triple-DES": 3
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 5
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 4
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon Technologies AG": 1
},
"NXP": {
"NXP Semiconductors": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "",
"/Keywords": "",
"/ModDate": "",
"/Producer": "",
"/Subject": "",
"/Title": "",
"/Trapped": "",
"pdf_file_size_bytes": 2130329,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 203
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-70_INF-4292.pdf",
"scheme": "ES",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"ATE_DPT.2",
"EAL4+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-70_ST-lite.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "4a020ae5059a8bdbef534c8fa308dcf189af5370a562a5655f18c63379fa3a10",
"txt_hash": "de14133b391db8c8423d0d2d89da49090f559f93a7527d7981116991f8fda144"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "56d43412d883ec44a8944535b215e40cf9844b19538b3578ab4e7d3434c8d79a",
"txt_hash": "d570a13e7bb6045f50a5bdede87570814377eca80bdd0450d674d80c51e895f3"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "c0f21f296b85c245d2f029a06dcf44da0af76a32c1f9fb951f498a88a81ea7c6",
"txt_hash": "b18b40f82aad05396adb20351a90e9ace51125b322efc3b0dce3a10b099c3e36"
}
},
"status": "active"
}