IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0 (BAC)

CSV information

Status archived
Valid from 07.03.2014
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer Morpho B.V.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL4+
Protection profiles

Heuristics summary

Certificate ID: BSI-DSZ-CC-0867-2014

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, CMAC
Asymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256
Schemes
MAC
Protocols
PACE, PGP
Randomness
RNG
Engines
SmartMX
Block cipher modes
CBC

Operating System name
JCOP 2
Vendor
NXP, NXP Semiconductors, Morpho

Security level
EAL 4, EAL 5, EAL1, EAL4, EAL5, EAL5+, EAL6, EAL3, EAL7, EAL2, EAL 4 augmented, ITSEC Evaluation
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_TDS.4, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_FUN, ATE_IND, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN.5, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0055-2009
Certificates
BSI-DSZ-CC-0867-2014, BSI-DSZ-CC-0866-2013, BSI-DSZ-CC-0866-V2-2014, BSI-DSZ-CC-0750-2011, BSI-DSZ-CC-0750-2011-MA-02, BSI-DSZ-CC-750, BSI-DSZ-CC-0858-2013, BSI-DSZ-CC-858, NSCIB-CC-13-37760, NSCIB-13-37760
Evaluation facilities
Brightsight, TÜV Informationstechnik

Side-channel analysis
JIL
Certification process
Security Target for the IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0, BAC Configuration, Morpho B.V. (confidential document) [7] Machine Readable Travel Document with "ICAO Application" Basic Access Control, Version 1.10, Version 1, Date: 2014-01-25, TÜV Informationstechnik GmbH – Evaluation Body for IT Security, (confidential document) [10] Configuration list for the TOE, Version 1.2.0, Date: 2014-01-24, IDeal Pass v2 - SAC/EAC JC, in BAC configuration (confidential document) [11] Guidance documentation for the TOE, Version 1.0.0, Date: 2014-01-22, Preparative Guidance for

Standards
FIPS 46-3, FIPS 197, FIPS180-2, FIPS 180-2, FIPS 186-3, FIPS 180-4, FIPS186-3, FIPS PUB 186-3, SP 800-38A, AIS 34, AIS 25, AIS 26, AIS 36, AIS 20, AIS 35, AIS 32, AIS 38, AIS36, RFC 5639, ICAO, ICAO-SAC
Technical reports
BSI 7125, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-0867-2014
Subject Machine Readable Travel Document
Keywords "Common Criteria, Certification, Zertifizierung"
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20140401144930+02'00'
Modification date D:20140401145414+02'00'
Pages 38
Creator Writer
Producer LibreOffice 3.6

Frontpage

Certificate ID BSI-DSZ-CC-0867-2014
Certified item IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0 (BAC
Certification lab BSI
Developer Morpho B.V

References

Outgoing
  • BSI-DSZ-CC-0858-2013 - archived - NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software
  • BSI-DSZ-CC-0750-2011 - archived - Crypto Library V2.7 on P5CD145V0A, MSO / P5CC145V0A, MSO / P5CD128V0A, MSO / P5CC128V0A, MSO
  • BSI-DSZ-CC-0866-V2-2014 - archived - IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0
  • BSI-DSZ-CC-0866-2013 - archived - IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0

Security target

Extracted keywords

Symmetric Algorithms
AES-128, AES, AES-192, AES-256, DES, 3DES, Triple-DES, KMAC, CMAC
Asymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA1, SHA-224, SHA224, SHA256, SHA-256
Schemes
MAC
Protocols
PACE
Randomness
TRNG, RND, RNG
Elliptic Curves
P-192, P-224, P-256, NIST P-192, NIST P-224, NIST P-256, secp192r1, secp224r1, secp256r1, FRP256v1, ANSSI FRP256v1
Block cipher modes
ECB, CBC

Operating System name
JCOP2, JCOP 2
IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG15, EF.DG13, EF.DG14, EF.COM, EF.SOD
Vendor
NXP, Morpho

Security level
EAL4, EAL 4, EAL4 augmented, EAL 4 augmented
Claims
A.MRTD_, OE.AA_MRTD, OE.MRTD_
Security Assurance Requirements (SAR)
ADV_SPM.1, ADV_ARC.1, ADV_COMP.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_LCD, ALC_CMC.4, ALC_CMS.4, ALC_COMP.1, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_COMP.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_COMP.1, AVA_VAN.3, ASE_CCL.1, ASE_COMP.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_COP, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FCS_CKM, FDP_ACF.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UIT.1, FDP_UCT.1.1, FDP_IFC.1, FDP_UIT, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC, FIA_API, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU.5.2, FIA_UAU.4, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.6, FIA_UAU.6.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FMT_LIM, FMT_MTD, FMT_SMR.1, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MSA.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_RVM.1, FPT_SEP.1, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0055, BSI-PP-0056, BSI-PP-0056-V2, BSI-PP-0002-2001, BSI-PP-0035-2007
Certificates
BSI-DSZ-CC-0867, BSI-DSZ-CC-0858-2013, BSI-DSZ-CC-0750, BSI-DSZ-CC-0866, NSCIB-CC-13-37760, CC-1, CC-2, CC-3
Evaluation facilities
TÜV Informationstechnik, TÜViT

Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineering

Standards
FIPS 180-4, FIPS 46-3, FIPS46, FIPS 197, FIPS 186-2, FIPS PUB 186-2, FIPS PUB 46-3, FIPS 186-3, FIPS PUB 197, RFC-5639, RFC3369, RFC 5639, ISO/IEC 7816-2, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 15946-1, ISO/IEC15946-2, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title 7301-9302-112 ASE-Lite IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0 (BAC configuration) v1.0.0
Subject Security Target Lite for the IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0 in BAC configuration
Keywords ASE, ASE-Lite, ST, ST-Lite, BSI-DSZ-CC-0867, ePassport, ePass, MRTD, Machine Readable Travel Documents, CC, EAL4+, BAC, Active Authentication, AA, ECC, ECDSA
Author Morpho
Creation date D:20140122000000
Modification date D:20140122000000
Pages 111
Creator PDFCreator Version 0.8.0
Producer AFPL Ghostscript 8.14

References

Outgoing
  • BSI-DSZ-CC-0858-2013 - archived - NXP Secure PKI Smart Card Controllers P5CD128V0v/ V0B(s), P5CC128V0v/ V0B(s), P5CD145V0v/ V0B(s), P5CC145V0v/ V0B(s), P5CN145V0v/V0B(s), each including IC Dedicated Software

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-0867-2014

Extracted SARs

ADV_ARC.1, ADV_COMP.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_COMP.1, ALC_DEL.1, ALC_DVS.2, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_COMP.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COMP.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_COMP.1, AVA_VAN.3

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "7dd1933e55a0241d",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0867-2014",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.0.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "60455fc9564e2545"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0866-2013",
          "BSI-DSZ-CC-0858-2013",
          "BSI-DSZ-CC-0866-V2-2014",
          "BSI-DSZ-CC-0750-2011"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0866-2013",
          "BSI-DSZ-CC-0555-2009",
          "BSI-DSZ-CC-0858-2013",
          "BSI-DSZ-CC-0633-2010",
          "BSI-DSZ-CC-0645-2010",
          "BSI-DSZ-CC-0750-2011",
          "BSI-DSZ-CC-0866-V2-2014"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0858-2013"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0858-2013"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Morpho B.V.",
  "manufacturer_web": "https://www.morpho.com",
  "name": "IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0 (BAC)",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2014-03-07",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0867a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0867-2014",
        "cert_item": "IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0 (BAC",
        "cert_lab": "BSI",
        "developer": "Morpho B.V",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0750-2011": 1,
          "BSI-DSZ-CC-0750-2011-MA-02": 1,
          "BSI-DSZ-CC-0858-2013": 1,
          "BSI-DSZ-CC-0866-2013": 7,
          "BSI-DSZ-CC-0866-V2-2014": 7,
          "BSI-DSZ-CC-0867-2014": 22,
          "BSI-DSZ-CC-750": 1,
          "BSI-DSZ-CC-858": 1
        },
        "NL": {
          "NSCIB-13-37760": 1,
          "NSCIB-CC-13-37760": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055-2009": 7
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 1,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 2,
          "ADV_TDS.5": 1,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 2,
          "ALC_CMC.5": 1,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 2,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 6,
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 2,
          "ALC_TAT.3": 1
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 1,
          "ATE_DPT.4": 1,
          "ATE_FUN": 2,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 2,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 3,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 6,
          "EAL 4 augmented": 3,
          "EAL 5": 3,
          "EAL1": 7,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 6,
          "EAL5": 7,
          "EAL5+": 2,
          "EAL6": 4,
          "EAL7": 4
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Security Target for the IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0, BAC Configuration, Morpho B.V. (confidential document) [7] Machine Readable Travel Document with \"ICAO Application\" Basic Access Control, Version 1.10": 1,
          "Version 1, Date: 2014-01-25, T\u00dcV Informationstechnik GmbH \u2013 Evaluation Body for IT Security, (confidential document) [10] Configuration list for the TOE, Version 1.2.0, Date: 2014-01-24, IDeal Pass v2 - SAC/EAC JC": 1,
          "in BAC configuration (confidential document) [11] Guidance documentation for the TOE, Version 1.0.0, Date: 2014-01-22, Preparative Guidance for": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 2
        }
      },
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 10
        },
        "PGP": {
          "PGP": 1
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 2": 2
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS 25": 2,
          "AIS 26": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 2,
          "AIS 38": 1,
          "AIS36": 2
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 180-4": 1,
          "FIPS 186-3": 1,
          "FIPS 197": 3,
          "FIPS 46-3": 2,
          "FIPS PUB 186-3": 1,
          "FIPS180-2": 3,
          "FIPS186-3": 1
        },
        "ICAO": {
          "ICAO": 21,
          "ICAO-SAC": 7
        },
        "NIST": {
          "SP 800-38A": 3
        },
        "RFC": {
          "RFC 5639": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "3DES": {
            "TDES": 3
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Morpho": {
          "Morpho": 15
        },
        "NXP": {
          "NXP": 7,
          "NXP Semiconductors": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20140401144930+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung\"",
      "/ModDate": "D:20140401145414+02\u002700\u0027",
      "/Producer": "LibreOffice 3.6",
      "/Subject": "Machine Readable Travel Document",
      "/Title": "Certification Report BSI-DSZ-CC-0867-2014",
      "pdf_file_size_bytes": 1066811,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 38
    },
    "st_filename": "0867b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDSA": {
            "ECDSA": 16
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0750": 2,
          "BSI-DSZ-CC-0858-2013": 2,
          "BSI-DSZ-CC-0866": 1,
          "BSI-DSZ-CC-0867": 2
        },
        "NL": {
          "CC-1": 4,
          "CC-2": 4,
          "CC-3": 3,
          "NSCIB-CC-13-37760": 5
        }
      },
      "cc_claims": {
        "A": {
          "A.MRTD_": 1
        },
        "OE": {
          "OE.AA_MRTD": 6,
          "OE.MRTD_": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002-2001": 1,
          "BSI-PP-0035-2007": 1,
          "BSI-PP-0055": 2,
          "BSI-PP-0056": 2,
          "BSI-PP-0056-V2": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_COMP.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE": 3,
          "AGD_OPE.1": 1,
          "AGD_PRE": 3,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_COMP.1": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 7,
          "ALC_LCD": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_COMP.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COMP.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_COMP.1": 1,
          "AVA_VAN.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 7,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 7,
          "FAU_SAS.1": 11,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 30,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 23,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 52,
          "FCS_COP.1": 9,
          "FCS_RND": 9,
          "FCS_RND.1": 13,
          "FCS_RND.1.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 18,
          "FDP_ACC.1.1": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 13,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 3,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 4,
          "FDP_ITC": 2,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 12,
          "FDP_UCT.1": 11,
          "FDP_UCT.1.1": 1,
          "FDP_UIT": 1,
          "FDP_UIT.1": 10,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 8,
          "FIA_AFL.1.1": 3,
          "FIA_AFL.1.2": 3,
          "FIA_API": 16,
          "FIA_API.1": 4,
          "FIA_API.1.1": 1,
          "FIA_SOS.2": 1,
          "FIA_UAU": 5,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 16,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 11,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 4,
          "FIA_UAU.6": 12,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 12,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 8,
          "FMT_LIM.1": 19,
          "FMT_LIM.1.1": 3,
          "FMT_LIM.2": 20,
          "FMT_LIM.2.1": 4,
          "FMT_MSA.1": 1,
          "FMT_MSA.2": 1,
          "FMT_MSA.3": 3,
          "FMT_MTD": 34,
          "FMT_MTD.1": 5,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 19,
          "FMT_SMR.1.1": 3,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.3": 10,
          "FPT_PHP.3.1": 1,
          "FPT_RVM.1": 1,
          "FPT_SEP.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 8,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 2
        },
        "FTP": {
          "FTP_ITC.1": 5,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 3
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 29
        }
      },
      "device_model": {},
      "ecc_curve": {
        "ANSSI": {
          "ANSSI FRP256v1": 1,
          "FRP256v1": 1
        },
        "NIST": {
          "NIST P-192": 1,
          "NIST P-224": 1,
          "NIST P-256": 1,
          "P-192": 1,
          "P-224": 1,
          "P-256": 1,
          "secp192r1": 1,
          "secp224r1": 1,
          "secp256r1": 1
        }
      },
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 1,
          "T\u00dcViT": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 7,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-224": 5,
            "SHA-256": 4,
            "SHA224": 1,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 7,
          "EF.DG1": 29,
          "EF.DG13": 3,
          "EF.DG14": 3,
          "EF.DG15": 8,
          "EF.DG16": 30,
          "EF.DG2": 9,
          "EF.DG3": 7,
          "EF.DG4": 5,
          "EF.DG5": 7,
          "EF.SOD": 7
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {
        "javacard": {
          "javacard.security": 1
        }
      },
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 2": 2,
          "JCOP2": 7
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 8
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 3,
          "Physical Tampering": 5,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 7,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 3,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 2,
          "CCMB-2012-09-002": 2,
          "CCMB-2012-09-003": 2,
          "CCMB-2012-09-004": 2
        },
        "FIPS": {
          "FIPS 180-4": 2,
          "FIPS 186-2": 1,
          "FIPS 186-3": 1,
          "FIPS 197": 1,
          "FIPS 46-3": 3,
          "FIPS PUB 186-2": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 1,
          "FIPS46": 2
        },
        "ICAO": {
          "ICAO": 20
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 15946-1": 1,
          "ISO/IEC 7816-2": 1,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC15946-2": 1
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC-5639": 2,
          "RFC3369": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 16,
            "AES-128": 4,
            "AES-192": 1,
            "AES-256": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 13,
            "Triple-DES": 12
          },
          "DES": {
            "DES": 6
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 7,
            "KMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Morpho": {
          "Morpho": 122
        },
        "NXP": {
          "NXP": 20
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Morpho",
      "/CreationDate": "D:20140122000000",
      "/Creator": "PDFCreator Version 0.8.0",
      "/Keywords": "ASE, ASE-Lite, ST, ST-Lite, BSI-DSZ-CC-0867, ePassport, ePass, MRTD, Machine Readable Travel Documents, CC, EAL4+, BAC, Active Authentication, AA, ECC, ECDSA",
      "/ModDate": "D:20140122000000",
      "/Producer": "AFPL Ghostscript 8.14",
      "/Subject": "Security Target Lite for the IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0 in BAC configuration",
      "/Title": "7301-9302-112 ASE-Lite IDeal Pass v2 - SAC/EAC JC ePassport 4.0.0 (BAC configuration) v1.0.0",
      "pdf_file_size_bytes": 602101,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 111
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0867a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0867b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "aa4c6c843ee7e51bced129a32aa76c9a1a8710bd22f8913519cfdb88c4a1b1f7",
      "txt_hash": "2e81fffa4532d42afae9ec626c84ac12f757c9faaae627c1a7db898737c62823"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "baac33592e838d2f2a79027abae2a5e704931800c5901193a64a8079745e1d02",
      "txt_hash": "eea2c9fac6bcfccbf23a62cccc006485056455b300139536d1d30b34a0bd0795"
    }
  },
  "status": "archived"
}