This page was not yet optimized for use on mobile
devices.
MTCOS Pro 2.2 EAC with PACE / S3CT9KW and S3CT9KC (BAC)
CSV information
| Status | archived |
|---|---|
| Valid from | 24.10.2014 |
| Valid until | 25.10.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | MaskTech International GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ALC_DVS.2, EAL4+ |
| Protection profiles |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0895-2014
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-256, AES-192, DES, 3DESAsymmetric Algorithms
ECCSchemes
MACProtocols
PACERandomness
TRNG, RNGEngines
TORNADOElliptic Curves
brainpoolP256r1, brainpoolP512r1Vendor
SamsungSecurity level
EAL 4, EAL 1, EAL 2, EAL5+, EAL6, EAL 3, EAL 5, EAL 6, EAL 7, EAL 4 augmented, ITSEC EvaluationClaims
OE.MRTDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN.5, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0055-2009, BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0056-V2-2012Certificates
BSI-DSZ-CC-0895-2014, BSI-DSZ-CC-0894-2014, BSI-DSZ-CC-S-0034-2014, BSI-DSZ-CC-S-0023-2013, BSI-DSZ-CC-S-0033-2014, ANSSI-CC-2012/70, ANSSI-CC-2012/70-S01Evaluation facilities
CESTI, SRC Security Research & ConsultingSide-channel analysis
side channel, fault injection, JILCertification process
Target MTCOS Pro 2.2 EAC with PACE / S3CT9KW and S3CT9KC (BAC), MaskTech International GmbH (confidential document) [7] Machine Readable Travel Document with "ICAO Application" Basic Access Control, Version 1.10, - MTCOS Pro 2.2 EAC with PACE / S3CT9KW and S3CT9KC (BAC), SRC Security Research & Consulting GmbH (confidential document) [11] MTCOS Pro 2.2 EAC with PACE / S3CT9KW and S3CT9KC, User Guidance, MaskTech International GmbH, 2 EAC with PACE / S3CT9KW and S3CT9KC (BAC), Version 0.4, 29.07.2014, MaskTech International GmbH (confidential document) [15] Machine Readable Travel Document with "ICAO Application" Extended Access Control, Version 1.3Standards
AIS 34, AIS 36, AIS 25, AIS 26, AIS 31, AIS 35, AIS 32, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ICAOTechnical reports
BSI 7138, BSI 7125, BSI 7148, BSI 24File metadata
| Title | Certification Report BSI-DSZ-CC-0895-2014 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, MRTD, BAC, EAC, PACE, MaskTech, Reisepass" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20141117093231+01'00' |
| Modification date | D:20141117093700+01'00' |
| Pages | 38 |
| Creator | Writer |
| Producer | LibreOffice 4.2 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0895-2014 |
|---|---|
| Certified item | MTCOS Pro 2.2 EAC with PACE / S3CT9KW and S3CT9KC (BAC |
| Certification lab | BSI |
| Developer | MaskTech International GmbH |
References
Outgoing- BSI-DSZ-CC-0894-2014 - archived - MTCOS Pro 2.2 EAC with PACE / S3CT9KW and S3CT9KC
- ANSSI-CC-2012/70 - archived - Microcontrôleurs SAMSUNG S3CT9KW, S3CT9KC et S3CT9K9 Revision 2.0 embarquant la bibliothèque RSA/ECC optionnelle TORNADO 2MX2 v2.2
- BSI-DSZ-CC-0894-2014 - archived - MTCOS Pro 2.2 EAC with PACE / S3CT9KW and S3CT9KC
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, 3DES, TDEA, KMACAsymmetric Algorithms
ECDH, ECDSA, ECCHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512Schemes
MAC, Key AgreementProtocols
PACERandomness
RND, RNGBlock cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG13, EF.DG15, EF.DG14, EF.COM, EF.SODTrusted Execution Environments
SSCVendor
SamsungSecurity level
EAL4, EAL5, EAL4 augmented, EAL5 augmentedClaims
O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FAU_SAS, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_RND.1, FCS_CKM.4.1, FCS_COP, FCS_RND.1.1, FCS_RND.1.2, FCS_UID.1, FCS_RNG, FCS_CKM, FCS_RNG.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UIT.1, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACF.1.2, FDP_ITC, FDP_ACC, FDP_ACF, FDP_IFC, FDP_ITT, FDP_ITT.1, FIA_UAU.5.2, FIA_UAU.4, FIA_AFL.1, FIA_UAU.6, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.6.1, FIA_AFL.6, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FIA_API, FMT_MTD, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_SMF.1.1, FMT_SMR.1.2, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD.1, FMT_MSA.1, FMT_MSA, FMT_SMF, FMT_LIM, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_RVM.1, FPT_SEP.1, FPT_FLS.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_FLS, FPT_PHP, FPT_ITT, FPT_ITT.1, FRU_FLT, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0035, BSI-CC-PP- 0055, BSI-CC-PP-0055, BSI-CC-PP-0056Certificates
BSI-DSZ-CC-0895, BSI-DSZ-CC-0894, BSI-DSZ-CC-S-0034-2014, BSI-DSZ-CC-S-0023-2013, BSI-DSZ-CC-S-0033-2014, ANSSI-CC-2012/70Side-channel analysis
Leak-Inherent, physical probing, Physical Probing, DPA, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringStandards
FIPS 180-3, FIPS 46-3, FIPS PUB 140-2, FIPS PUB 180-3, FIPS PUB 46-3, AIS 20, AIS 31, RFC3369, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 7816-2, ISO/IEC 7816-4, ISO/IEC 7816:2008, ISO/IEC 9797:1999, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004, CCMB-2005-08-001Technical reports
BSI TR-03110File metadata
| Title | MTCOS Pro 2.2 ICAO - EAC with PACE /S3CT9KW and S3CT9KC (BAC) - Security Target lite |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | Common Criteria, CC, Machine Readable Travel Document, MRTD, Basic Access Control, BAC, ePass, MTCOS, EAL 4+ |
| Author | MaskTech International GmbH |
| Creation date | D:20141024172111Z |
| Modification date | D:20141024172511+02'00' |
| Pages | 78 |
| Creator | TeX output 2014.10.24:1721 |
| Producer | dvipdfm 0.13.2c, Copyright © 1998, by Mark A. Wicks |
References
Outgoing- ANSSI-CC-2012/70 - archived - Microcontrôleurs SAMSUNG S3CT9KW, S3CT9KC et S3CT9K9 Revision 2.0 embarquant la bibliothèque RSA/ECC optionnelle TORNADO 2MX2 v2.2
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0895-2014Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_INT.3, ADV_SPM.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| MTCOS Pro 2.2 EAC with PACE / S3CT9KW and S3CT9KC | BSI-DSZ-CC-0894-2014 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "6ff76af248b7317a",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0895-2014",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"60455fc9564e2545"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0894-2014"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2012/70",
"BSI-DSZ-CC-0894-2014"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0895-2014",
"BSI-DSZ-CC-0894-2014"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0894-2014",
"BSI-DSZ-CC-0547-2009",
"BSI-DSZ-CC-0895-2014",
"ANSSI-CC-2012/70",
"BSI-DSZ-CC-0639-2010"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2012/70"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2012/70"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "MaskTech International GmbH",
"manufacturer_web": "https://www.masktech.de/",
"name": "MTCOS Pro 2.2 EAC with PACE / S3CT9KW and S3CT9KC (BAC)",
"not_valid_after": "2019-10-25",
"not_valid_before": "2014-10-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0895a_pdf.pdf",
"report_frontpage": {
"DE": {
"cc_security_level": "Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2 SOGIS Recognition Agreement",
"cc_version": "PP conformant Common Criteria Part 2 extended",
"cert_id": "BSI-DSZ-CC-0895-2014",
"cert_item": "MTCOS Pro 2.2 EAC with PACE / S3CT9KW and S3CT9KC (BAC",
"cert_lab": "BSI",
"developer": "MaskTech International GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
],
"ref_protection_profiles": "Machine Readable Travel Document with \"ICAO Application\" Basic Access Control, Version 1.10, 25 March 2009, BSI-CC-PP-0055-2009"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 3
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0894-2014": 5,
"BSI-DSZ-CC-0895-2014": 22,
"BSI-DSZ-CC-S-0023-2013": 2,
"BSI-DSZ-CC-S-0033-2014": 2,
"BSI-DSZ-CC-S-0034-2014": 2
},
"FR": {
"ANSSI-CC-2012/70": 2,
"ANSSI-CC-2012/70-S01": 2
}
},
"cc_claims": {
"OE": {
"OE.MRTD": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055-2009": 6,
"BSI-CC-PP-0056-V2-2012": 1,
"BSI-CC-PP-0056-V2-2012-MA-02": 1,
"BSI-CC-PP-0068-V2-2011": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 2,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 7,
"ALC_FLR": 3,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 7,
"EAL 2": 4,
"EAL 3": 4,
"EAL 4": 14,
"EAL 4 augmented": 3,
"EAL 5": 7,
"EAL 6": 3,
"EAL 7": 4,
"EAL5+": 1,
"EAL6": 1
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"- MTCOS Pro 2.2 EAC with PACE / S3CT9KW and S3CT9KC (BAC), SRC Security Research \u0026 Consulting GmbH (confidential document) [11] MTCOS Pro 2.2 EAC with PACE / S3CT9KW and S3CT9KC, User Guidance, MaskTech International GmbH": 1,
"2 EAC with PACE / S3CT9KW and S3CT9KC (BAC), Version 0.4, 29.07.2014, MaskTech International GmbH (confidential document) [15] Machine Readable Travel Document with \"ICAO Application\" Extended Access Control, Version 1.3": 1,
"Target MTCOS Pro 2.2 EAC with PACE / S3CT9KW and S3CT9KC (BAC), MaskTech International GmbH (confidential document) [7] Machine Readable Travel Document with \"ICAO Application\" Basic Access Control, Version 1.10": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"TORNADO": {
"TORNADO": 2
}
},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 22
}
},
"crypto_scheme": {
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {
"Brainpool": {
"brainpoolP256r1": 2,
"brainpoolP512r1": 1
}
},
"eval_facility": {
"CESTI": {
"CESTI": 1
},
"SRC": {
"SRC Security Research \u0026 Consulting": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"fault injection": 1
},
"SCA": {
"side channel": 1
},
"other": {
"JIL": 3
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 1,
"AIS 36": 3
},
"ICAO": {
"ICAO": 14
},
"ISO": {
"ISO/IEC 15408": 4,
"ISO/IEC 17065": 2,
"ISO/IEC 18045": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2,
"AES-128": 2,
"AES-192": 1,
"AES-256": 1
}
},
"DES": {
"3DES": {
"3DES": 3
},
"DES": {
"DES": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI 24": 1,
"BSI 7125": 2,
"BSI 7138": 2,
"BSI 7148": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 9
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20141117093231+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, MRTD, BAC, EAC, PACE, MaskTech, Reisepass\"",
"/ModDate": "D:20141117093700+01\u002700\u0027",
"/Producer": "LibreOffice 4.2",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0895-2014",
"pdf_file_size_bytes": 1218915,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
},
"st_filename": "0895b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 3
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0894": 1,
"BSI-DSZ-CC-0895": 2,
"BSI-DSZ-CC-S-0023-2013": 1,
"BSI-DSZ-CC-S-0033-2014": 1,
"BSI-DSZ-CC-S-0034-2014": 1
},
"FR": {
"ANSSI-CC-2012/70": 2
}
},
"cc_claims": {
"O": {
"O.RND": 1
},
"T": {
"T.RND": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0055": 1,
"BSI-CC-PP-0055": 5,
"BSI-CC-PP-0056": 2,
"BSI-PP-0035": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 8,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 2,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 1,
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 10,
"EAL4 augmented": 4,
"EAL5": 2,
"EAL5 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 2,
"FAU_SAS.1": 13,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM": 7,
"FCS_CKM.1": 29,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 23,
"FCS_CKM.4.1": 1,
"FCS_COP": 84,
"FCS_COP.1": 9,
"FCS_RND.1": 15,
"FCS_RND.1.1": 1,
"FCS_RND.1.2": 1,
"FCS_RNG": 2,
"FCS_RNG.1": 3,
"FCS_UID.1": 1
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 22,
"FDP_ACC.1.1": 1,
"FDP_ACF": 2,
"FDP_ACF.1": 17,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 2,
"FDP_IFC": 2,
"FDP_IFC.1": 7,
"FDP_ITC": 2,
"FDP_ITC.1": 10,
"FDP_ITC.2": 10,
"FDP_ITT": 2,
"FDP_ITT.1": 3,
"FDP_UCT.1": 11,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 10,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_AFL.6": 1,
"FIA_API": 1,
"FIA_UAU": 5,
"FIA_UAU.1": 9,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 14,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 11,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 4,
"FIA_UAU.6": 12,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 13,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 4,
"FMT_LIM.1": 21,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 17,
"FMT_LIM.2.1": 2,
"FMT_MSA": 4,
"FMT_MSA.1": 2,
"FMT_MSA.3": 4,
"FMT_MTD": 26,
"FMT_MTD.1": 5,
"FMT_SMF": 2,
"FMT_SMF.1": 27,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 19,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS": 2,
"FPT_FLS.1": 17,
"FPT_FLS.1.1": 1,
"FPT_ITT": 2,
"FPT_ITT.1": 3,
"FPT_PHP": 2,
"FPT_PHP.3": 20,
"FPT_PHP.3.1": 1,
"FPT_RVM.1": 1,
"FPT_SEP.1": 1,
"FPT_TST.1": 12,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 2
},
"FRU": {
"FRU_FLT": 2,
"FRU_FLT.2": 5
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_TRP.1": 5
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 7
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 5
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 17
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 7
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 2,
"SHA-384": 2,
"SHA-512": 2
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 8,
"EF.DG1": 30,
"EF.DG13": 4,
"EF.DG14": 2,
"EF.DG15": 2,
"EF.DG16": 28,
"EF.DG2": 10,
"EF.DG3": 8,
"EF.DG4": 7,
"EF.DG5": 8,
"EF.SOD": 8
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 3,
"RNG": 6
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 16,
"Physical Tampering": 7,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 6,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 5,
"Physical Probing": 2,
"physical probing": 4
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS 31": 2
},
"CC": {
"CCMB-2005-08-001": 1,
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
},
"FIPS": {
"FIPS 180-3": 1,
"FIPS 46-3": 2,
"FIPS PUB 140-2": 1,
"FIPS PUB 180-3": 1,
"FIPS PUB 46-3": 1
},
"ICAO": {
"ICAO": 18
},
"ISO": {
"ISO/IEC 14443": 4,
"ISO/IEC 7816": 4,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-4": 1,
"ISO/IEC 7816:2008": 1,
"ISO/IEC 9797:1999": 1
},
"RFC": {
"RFC3369": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"3DES": 5,
"TDEA": 1,
"Triple-DES": 20
},
"DES": {
"DES": 6
}
},
"constructions": {
"MAC": {
"KMAC": 1
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 1
}
},
"tee_name": {
"IBM": {
"SSC": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 6
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "MaskTech International GmbH",
"/CreationDate": "D:20141024172111Z",
"/Creator": " TeX output 2014.10.24:1721",
"/Keywords": "Common Criteria, CC, Machine Readable Travel Document, MRTD, Basic Access Control, BAC, ePass, MTCOS, EAL 4+",
"/ModDate": "D:20141024172511+02\u002700\u0027",
"/Producer": "dvipdfm 0.13.2c, Copyright \u00a9 1998, by Mark A. Wicks",
"/Subject": "Common Criteria Certification",
"/Title": "MTCOS Pro 2.2 ICAO - EAC with PACE /S3CT9KW and S3CT9KC (BAC) - Security Target lite",
"pdf_file_size_bytes": 413863,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 78
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0895a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0895b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ad91a9e286c4b5cbba0977e827b481b9e6e5834bd589057cd26e437484599009",
"txt_hash": "f44c46eaf7e6c8da7237fa477042a0634305a185df38c2c95418cb0dfeeec114"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d4ebf297830fbc5642a144837c23c2f29edd6f97f9c5d9f683789a8e2df888d0",
"txt_hash": "8b57f87ca1227da243b58737239d1e6841219b94f0079842a0a5921624f62ef8"
}
},
"status": "archived"
}