MK Lotus GovID IMDa in EAC with PACE configuration v4.6.8.8

CSV information

Status active
Valid from 18.01.2026
Valid until 18.01.2031
Scheme 🇪🇸 ES
Manufacturer MK Smart Joint Stock Company
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL5+, AVA_VAN.5, ALC_DVS.2
Protection profiles

Heuristics summary

Certificate ID: 2023-40-INF-4733

Certificate

Extracted keywords

Protocols
PACE

Security level
EAL 2, EAL5+
Claims
O.E
Security Assurance Requirements (SAR)
ALC_FLR, ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0056-V2-2012
Evaluation facilities
Applus Laboratories

Standards
ICAO

File metadata

Creation date D:20260108114131+01'00'
Modification date D:20260108114131+01'00'
Pages 2
Producer GPL Ghostscript 9.27

Certification report

Extracted keywords

Asymmetric Algorithms
Diffie-Hellman
Protocols
PACE

Security level
EAL5, EAL 1, EAL 4, EAL 2, EAL2, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_IMP.1, ADV_TDS.4, AGD_OPE.1, ALC_DVS.2, ALC_CMC.4, ALC_DEL.1, ALC_LCD.1, ALC_FLR, ATE_COV.2, ATE_FUN.1, AVA_VAN.5, ASE_CCL.1, ASE_INT.1, ASE_REQ.2
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_RND.1, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_UIT, FIA_UID, FIA_UAU, FIA_API, FIA_AFL, FMT_SMR, FMT_SMF.1, FMT_LIM.2, FMT_MTD, FMT_MTD.3, FPT_EMS.1, FPT_TST.1, FTP_ITC
Protection profiles
BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2
Certificates
2023-40-INF-4733- v1
Evaluation facilities
Applus Laboratories

Side-channel analysis
JIL

Standards
ICAO, SCP03
Technical reports
BSI TR-03110

File metadata

Author 9308
Creation date D:20260203103909+01'00'
Modification date D:20260203103909+01'00'
Pages 15
Creator Microsoft® Word LTSC
Producer Microsoft® Word LTSC

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES, TDES, KMAC, CMAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA256, SHA-256, SHA-224, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Protocols
PACE, PGP
Randomness
RND
Elliptic Curves
P-224, P-256, P-384, P-521, NIST P-224, NIST P-256, NIST P-384, NIST P-521, secp224r1, secp256r1, secp384r1, secp521r1
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.DG15, EF.DG13, EF.COM, EF.SOD
Vendor
Infineon, Infineon Technologies AG

Security level
EAL5+, EAL 5, EAL5, EAL6+, EAL6
Claims
O.TDES, O.ECC, O.AES-TDES-MAC, O.AES, O.RSA, O.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.1, ADV_TDS.3, ADV_TDS.1, ADV_FSP.2, ADV_FSP.4, ADV_ARC, ADV_FSP, ADV_TDS, ADV_IMP, AGD_PRE.1, AGD_OPE.1, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_DEL.1, ALC_CMC.4, ALC_CMS.5, ALC_LCD.1, ALC_TAT.2, ALC_DVS.1, ALC_TAT.1, ALC_CMS.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ALC_FLR.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.5, AVA_VAN, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_REQ.1, ASE_COMP
Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_COP, FCS_CKM, FCS_RND, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FCS_RNG, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_ACC.1, FDP_ACC, FDP_ACF.1, FDP_RIP.1.1, FDP_RIP, FDP_UCT.1, FDP_UCT, FDP_IFC.1, FDP_UIT.1, FDP_UIT, FDP_ITC, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FIA_API, FIA_API.1, FIA_UID, FIA_UAU, FIA_API.1.1, FIA_SOS.2, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.6, FIA_AFL.1, FIA_AFL, FMT_MTD, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FMT_MTD.3, FMT_SMR.1, FMT_SMR, FMT_SMF.1, FMT_SMF.1.1, FMT_MTD.1, FMT_MTD.3.1, FMT_MSA, FMT_MSA.1, FMT_SMF, FPT_EMS.1.2, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3, FPT_PHP.3.1, FPT_FLS, FPT_ITT.1, FPT_TST.2, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0068-V2, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0084-2014, BSI-CC-PP-0055
Certificates
BSI-DSZ-CC-1107-V5-2024

Side-channel analysis
Leak-Inherent, physical probing, side channels, side channel, DPA, SPA, timing attacks, Physical Tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS PUB 180-4, FIPS 180-4, AIS31, RFC2119, RFC3369, ISO/IEC 9796-2, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 15946-2, ICAO, SCP03
Technical reports
BSI TR-03110

File metadata

Creation date D:20260109104235+01'00'
Modification date D:20260109104235+01'00'
Pages 136
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

References

Outgoing
  • BSI-DSZ-CC-1107-V5-2024 - active - IFX_CCI_00002Dh, 000039h, 00003Ah, 000044h, 000045h, 000046h, 000047h, 000048h, 000049h, 00004Ah, 00004Bh, 00004Ch, 00004Dh, 00004Eh design step T11 with firmware 80.306.16.0, 80.306.16.1 or 80.312.02.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 or v2.11.003, optional ACL v3.35.001, v3.34.000, v3.33.003 or v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and user guidance

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

2023-40-INF-4733

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Similar certificates

Name Certificate ID
MK Lotus GovID IMDa in BAC configuration v4.6.8.8 2023-39-INF-4729 Compare

Scheme data

Product MK Lotus GovID IMDa in EAC with PACE configuration v4.6.8.8
Product Link https://oc.ccn.cni.es/en/certified-products/certified-products/1069-mk-lotus-govid-imda-in-eac-with-pace-configuration-v4-6-8-8
Category Smart Cards and similiar devices
Manufacturer MK Smart Joint Stock Company
Certification Date 18.01.2026
Enhanced
Description The TOE is an electronic travel document representing a contactless smart card programmed according to ICAO Docs 9303 v2021 parts 10, 11 and 12, and additionally providing the Extended Access Control according to the BSI TR-03110 parts 1 and 3. The communication between terminal and chip shall be protected by Password Authenticated Conn Establishment (PACE) according to Electronic Passport using Standard Inspection Procedure with PACE (PACE PP), BSI-CC-PP-0068-V2.
Category Smart Cards and similiar devices
Manufacturer MK Smart Joint Stock Company
Type Product
Evaluation Facility Applus Laboratories
Status Certified
Certification Date 18.01.2026
Cc Version Common Criteria 3.1 release 5
Level EAL5 + (ALC_DVS.2, AVA_VAN.5)
Target Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2362
Cert Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2363
Report Link https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=2364

References

Loading...

Updates Feed

  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-40_Certificado.pdf",
  "dgst": "1d14dc57d44c8809",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "2023-40-INF-4733",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.6.8.8"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "b380aabf93b29692",
        "a33327d40f253f46"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "Smart Cards and similiar devices",
      "certification_date": "2026-01-18",
      "enhanced": {
        "category": "Smart Cards and similiar devices",
        "cc_version": "Common Criteria 3.1 release 5",
        "cert_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2363",
        "certification_date": "2026-01-18",
        "description": "The TOE is an electronic travel document representing a contactless smart card programmed according to ICAO Docs 9303 v2021 parts 10, 11 and 12, and additionally providing the Extended Access Control according to the BSI TR-03110 parts 1 and 3. The communication between terminal and chip shall be protected by Password Authenticated Conn Establishment (PACE) according to Electronic Passport using Standard Inspection Procedure with PACE (PACE PP), BSI-CC-PP-0068-V2.",
        "evaluation_facility": "Applus Laboratories",
        "level": "EAL5 + (ALC_DVS.2, AVA_VAN.5)",
        "manufacturer": "MK Smart Joint Stock Company",
        "report_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2364",
        "status": "Certified",
        "target_link": "https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw\u0026task=download\u0026fid=2362",
        "type": "Product"
      },
      "manufacturer": "MK Smart Joint Stock Company",
      "product": "MK Lotus GovID IMDa in EAC with PACE configuration v4.6.8.8",
      "product_link": "https://oc.ccn.cni.es/en/certified-products/certified-products/1069-mk-lotus-govid-imda-in-eac-with-pace-configuration-v4-6-8-8"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-V5-2024"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-V5-2024"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "MK Smart Joint Stock Company",
  "manufacturer_web": "https://mksmart.com.vn/en/",
  "name": "MK Lotus GovID IMDa in EAC with PACE configuration v4.6.8.8",
  "not_valid_after": "2031-01-18",
  "not_valid_before": "2026-01-18",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "2023-40_Certificado.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.E": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL5+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 6
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ICAO": {
          "ICAO": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20260108114131+01\u002700\u0027",
      "/ModDate": "D:20260108114131+01\u002700\u0027",
      "/Producer": "GPL Ghostscript 9.27",
      "pdf_file_size_bytes": 919454,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "2023-40_INF-4733.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {
        "ES": {
          "2023-40-INF-4733- v1": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012": 2,
          "BSI-CC-PP-0068-V2": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_OPE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 8,
          "ALC_FLR": 3,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_INT.1": 1,
          "ASE_REQ.2": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_FUN.1": 1
        },
        "AVA": {
          "AVA_VAN.5": 9
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL2": 1,
          "EAL5": 8
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 1
        },
        "FCS": {
          "FCS_CKM": 3,
          "FCS_CKM.4": 1,
          "FCS_COP": 9,
          "FCS_RND.1": 1
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACF": 1,
          "FDP_RIP.1": 1,
          "FDP_UIT": 1
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_API": 2,
          "FIA_UAU": 6,
          "FIA_UID": 2
        },
        "FMT": {
          "FMT_LIM.2": 1,
          "FMT_MTD": 8,
          "FMT_MTD.3": 1,
          "FMT_SMF.1": 1,
          "FMT_SMR": 1
        },
        "FPT": {
          "FPT_EMS.1": 1,
          "FPT_TST.1": 1
        },
        "FTP": {
          "FTP_ITC": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 29
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Applus": {
          "Applus Laboratories": 4
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JIL": 1
        }
      },
      "standard_id": {
        "ICAO": {
          "ICAO": 19
        },
        "SCP": {
          "SCP03": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 3
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "9308",
      "/CreationDate": "D:20260203103909+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word LTSC",
      "/ModDate": "D:20260203103909+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word LTSC",
      "pdf_file_size_bytes": 279468,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "2023-40_ST-Lite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 5
          },
          "ECDH": {
            "ECDH": 14
          },
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 11
          }
        },
        "RSA": {
          "RSA-CRT": 3
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1107-V5-2024": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.AES": 2,
          "O.AES-TDES-MAC": 5,
          "O.ECC": 4,
          "O.RND": 8,
          "O.RSA": 2,
          "O.TDES": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0056-V2-2012": 2,
          "BSI-CC-PP-0068-V2": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 2,
          "BSI-CC-PP-0084-2014": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 2,
          "ADV_ARC.1": 8,
          "ADV_FSP": 1,
          "ADV_FSP.1": 4,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 10,
          "ADV_IMP": 1,
          "ADV_IMP.1": 11,
          "ADV_INT.2": 3,
          "ADV_TDS": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 10
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 8,
          "AGD_PRE": 1,
          "AGD_PRE.1": 9
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.4": 3,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL": 1,
          "ALC_DEL.1": 4,
          "ALC_DVS": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 10,
          "ALC_FLR.1": 1,
          "ALC_LCD": 1,
          "ALC_LCD.1": 5,
          "ALC_TAT": 1,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 5
        },
        "ASE": {
          "ASE_CCL.1": 3,
          "ASE_COMP": 1,
          "ASE_ECD.1": 6,
          "ASE_INT.1": 7,
          "ASE_OBJ.2": 5,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 4,
          "ASE_SPD.1": 4,
          "ASE_TSS.1": 3
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 5,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 3,
          "ATE_FUN.1": 8,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 11
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL5": 5,
          "EAL5+": 5,
          "EAL6": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 4,
          "FAU_SAS.1": 15,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 57,
          "FCS_CKM.1": 30,
          "FCS_CKM.2": 7,
          "FCS_CKM.4": 54,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 183,
          "FCS_COP.1": 17,
          "FCS_RND": 4,
          "FCS_RND.1": 17,
          "FCS_RND.1.1": 2,
          "FCS_RNG": 11
        },
        "FDP": {
          "FDP_ACC": 14,
          "FDP_ACC.1": 9,
          "FDP_ACF": 16,
          "FDP_ACF.1": 18,
          "FDP_IFC.1": 5,
          "FDP_ITC": 2,
          "FDP_ITC.1": 22,
          "FDP_ITC.2": 22,
          "FDP_ITT.1": 3,
          "FDP_RIP": 1,
          "FDP_RIP.1": 11,
          "FDP_RIP.1.1": 1,
          "FDP_SDC.1": 1,
          "FDP_SDI.2": 1,
          "FDP_UCT": 8,
          "FDP_UCT.1": 3,
          "FDP_UIT": 8,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 6,
          "FIA_AFL.1": 3,
          "FIA_API": 20,
          "FIA_API.1": 8,
          "FIA_API.1.1": 1,
          "FIA_SOS.2": 1,
          "FIA_UAU": 70,
          "FIA_UAU.1": 7,
          "FIA_UAU.4": 2,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 5,
          "FIA_UAU.6": 3,
          "FIA_UID": 25,
          "FIA_UID.1": 11
        },
        "FMT": {
          "FMT_LIM": 6,
          "FMT_LIM.1": 29,
          "FMT_LIM.1.1": 3,
          "FMT_LIM.2": 21,
          "FMT_LIM.2.1": 4,
          "FMT_MSA": 1,
          "FMT_MSA.1": 2,
          "FMT_MSA.3": 4,
          "FMT_MTD": 72,
          "FMT_MTD.1": 12,
          "FMT_MTD.3": 9,
          "FMT_MTD.3.1": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 39,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 20,
          "FMT_SMR.1": 23
        },
        "FPT": {
          "FPT_EMS": 5,
          "FPT_EMS.1": 11,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 5,
          "FPT_FLS": 1,
          "FPT_FLS.1": 13,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 3,
          "FPT_PHP.3": 11,
          "FPT_PHP.3.1": 1,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 2,
          "FPT_TST.2": 1
        },
        "FRU": {
          "FRU_FLT.2": 5
        },
        "FTP": {
          "FTP_ITC": 11,
          "FTP_ITC.1": 10,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 8
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 373
        },
        "PGP": {
          "PGP": 1
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 25
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-224": 6,
          "NIST P-256": 6,
          "NIST P-384": 6,
          "NIST P-521": 4,
          "P-224": 6,
          "P-256": 6,
          "P-384": 6,
          "P-521": 4,
          "secp224r1": 6,
          "secp256r1": 6,
          "secp384r1": 6,
          "secp521r1": 4
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 15
          },
          "SHA2": {
            "SHA-224": 7,
            "SHA-256": 10,
            "SHA-384": 3,
            "SHA-512": 3,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 3,
          "EF.DG1": 11,
          "EF.DG13": 1,
          "EF.DG14": 4,
          "EF.DG15": 2,
          "EF.DG16": 9,
          "EF.DG2": 5,
          "EF.DG3": 14,
          "EF.DG4": 14,
          "EF.DG5": 3,
          "EF.SOD": 6
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 8
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 5,
          "Physical Tampering": 3,
          "Physical tampering": 2,
          "fault injection": 1,
          "malfunction": 6
        },
        "SCA": {
          "DPA": 4,
          "Leak-Inherent": 4,
          "SPA": 2,
          "physical probing": 5,
          "side channel": 1,
          "side channels": 1,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS PUB 180-4": 2
        },
        "ICAO": {
          "ICAO": 36
        },
        "ISO": {
          "ISO/IEC 14443": 4,
          "ISO/IEC 15946-2": 1,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 9796-2": 1
        },
        "RFC": {
          "RFC2119": 2,
          "RFC3369": 1
        },
        "SCP": {
          "SCP03": 19
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 38
          }
        },
        "DES": {
          "3DES": {
            "3DES": 5,
            "TDES": 6,
            "Triple-DES": 28
          },
          "DES": {
            "DES": 3
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 10,
            "KMAC": 4
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 3
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 11,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20260109104235+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/ModDate": "D:20260109104235+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "pdf_file_size_bytes": 4140200,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 136
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-40_INF-4733.pdf",
  "scheme": "ES",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL5+",
      "ALC_DVS.2",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2023-40_ST-Lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "ff6cf6a78f5d92fc9d3229f315cce1cb4dee809aa9475ab5eacb00506ce8054f",
      "txt_hash": "357480c1353518a32e3a4fea5d96b0108c1c3b8772403f44a3f3b9c97063b8a0"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "77535199e2189df42f8d370c774a89d8189a16d4a03fdc09e2dc8a5079378bd1",
      "txt_hash": "9e9bf0d13f4e7093605b2450a84337bbc1b8e3d9a656469682c52f3b183d8ef8"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "2a8be3196549c48ed5e1fa15aea29186c74a3e3ef2cdb8fc29f727b61b1ffb4e",
      "txt_hash": "b74c3a94a4ae504944957cbafada9f40953737aba073339628047dac29b38543"
    }
  },
  "status": "active"
}