Swissbit TSE SMAERS Firmware

CSV information

Status active
Valid from 12.03.2021
Valid until 12.03.2029
Scheme 🇩🇪 DE
Manufacturer Swissbit AG
Category Other Devices and Systems
Security level EAL2
Protection profiles
Maintenance updates Swissbit TSE SMAERS Firmware (31.03.2023) Certification report

Heuristics summary

Certificate ID: BSI-DSZ-CC-1121-V2-2021

Certificate

Extracted keywords

Security level
EAL 2
Protection profiles
BSI-CC-PP-0105-2019
Certificates
BSI-DSZ-CC-1121-V2-2021

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title Certificate BSI-DSZ-CC-1121-V2-2021
Subject Common Criteria Certification
Keywords Common Criteria, Certification, Zertifizierung, Registrierkasse, TSE, PP 105, Swissbit AG
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20210323152435+01'00'
Modification date D:20210323152545+01'00'
Pages 1
Creator Writer
Producer LibreOffice 6.3

Certification report

Extracted keywords

Symmetric Algorithms
AES, CMAC
Protocols
PACE
Randomness
DRBG

Trusted Execution Environments
SE
Vendor
NXP

Security level
EAL 2, EAL 1, EAL 4
Security Assurance Requirements (SAR)
ALC_FLR, ALC_DEL, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2
Protection profiles
BSI-CC-PP-0105-2019, BSI-CC-PP- 0105-2019
Certificates
BSI-DSZ-CC-1121-V2-2021, BSI-DSZ-CC-1121-2019, BSI-DSZ-CC-1118-2020
Evaluation facilities
MTG AG, T-Systems International

Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Report, Version 2.4, 11 March 2021, ETR Part Summary, MTG AG Prüfstelle für IT-Sicherheit, (confidential document) [8] Security Module Application for Electronic Record-keeping Systems (SMAERS) Version 0.7.5, 6

Standards
FIPS 197, FIPS 180-4, FIPS PUB 197, FIPS PUB 180-4, NIST SP 800-38B, AIS14, AIS19, AIS 20, AIS 32, AIS 46, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 7816-6, ICAO
Technical reports
BSI TR-03151, BSI TR-03153, BSI TR-03116, BSI TR-02102, BSI 7148

File metadata

Title Certification Report BSI-DSZ-CC-1121-V2-2021
Subject Common Criteria Certification
Keywords Common Criteria, Certification, Zertifizierung, Registrierkasse, TSE, PP 105, Swissbit AG
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20210323151023+01'00'
Modification date D:20210323152414+01'00'
Pages 26
Creator Writer
Producer LibreOffice 6.3

Frontpage

Certificate ID BSI-DSZ-CC-1121-V2-2021
Certified item Swissbit TSE SMAERS Firmware
Certification lab BSI
Developer Swissbit AG

References

Outgoing

Security target

Extracted keywords

Symmetric Algorithms
AES, AES-256, HMAC, CMAC
Asymmetric Algorithms
ECDSA, ECC
Post-quantum Algorithms
LMS
Schemes
MAC, Key agreement
Protocols
TLS 1.2, TLS, PACE
Randomness
RNG
Elliptic Curves
Curve P-256, Curve P-384, Curve P-521, P-256, P-384, P-521, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1
Block cipher modes
GCM

Trusted Execution Environments
SE, TEE
Vendor
Microsoft

Security level
EAL 2, EAL2
Claims
O.G, O.IA, O.I, O.T, O.TEE, O.TST, O.IAA, T.M, A.C, A.V, A.CSP, OE.ERS, OE.CSP, OE.SUCP
Security Assurance Requirements (SAR)
ADV_FSP
Security Functional Requirements (SFR)
FAU_GEN.1, FCS_RNG.1, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACF, FDP_ACC.1, FDP_IFC.1, FDP_ACC, FDP_ACF.1, FDP_ITC, FDP_ETC, FDP_ITC.1, FDP_ITC.2, FDP_ETC.2, FDP_DAU, FDP_RIP, FDP_RIP.1, FIA_ATD.1, FIA_API.1, FIA_UID.1, FIA_UAU.5.2, FIA_AFL.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_USB.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.6, FIA_AFL, FIA_ATD, FIA_UAU, FIA_UID, FIA_USB, FIA_API.1.1, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF, FMT_SMF.1.1, FMT_MOF.1, FMT_MTD, FMT_MSA.3, FMT_MSA.4, FMT_MOF, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1.1, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.3, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.4.1, FPT_TEE.1, FPT_TST.1, FPT_TDC.1, FPT_STM.1, FPT_STM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_FLS.1, FPT_TEE.1.1, FPT_TEE.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TRP.1, FPT_TDC, FPT_FLS, FPT_TEE, FPT_TST, FTP_TRP.1, FTP_ITC.1, FTP_ITC

Standards
FIPS 140-2, FIPS 180-4, FIPS 186-4, FIPS 197, FIPS PUB 198-1, NIST SP 800-38B, SP 800-38E, AIS 20, AIS 31, RFC-5246, RFC-8446, RFC-5639, RFC-2986, RFC-5280, RFC-6816, ISO/IEC 18033-3, ISO/IEC 7816-3, ISO/IEC 21827:2008, ICAO, X.509, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-03116-5, BSI TR-02102-1, BSI TR-03111, BSI TR-03145, BSI TR-03153, BSI TR-03151, BSI TR-03116

File metadata

Title Swissbit TSE SMAERS Firmware - Common Criteria Security Target
Creation date D:20201126193432+01'00'
Modification date D:20201126193432+01'00'
Pages 75
Creator Asciidoctor PDF 1.5.0.alpha.16, based on Prawn 2.2.2
Producer Asciidoctor PDF 1.5.0.alpha.16, based on Prawn 2.2.2

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

BSI-DSZ-CC-1121-V2-2021

Extracted SARs

ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Similar certificates

Name Certificate ID
Swissbit TSE SMAERS Firmware BSI-DSZ-CC-1121-2019 Compare

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1121V2c_pdf.pdf",
  "dgst": "6cdbbb18e35a7857",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1121-V2-2021",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL2",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "faf328d504ee2404"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1121-2019",
          "BSI-DSZ-CC-1118-2020"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1059-2018",
          "BSI-DSZ-CC-1059-V2-2019",
          "BSI-DSZ-CC-0973-2016",
          "BSI-DSZ-CC-0973-V2-2016",
          "BSI-DSZ-CC-1121-2019",
          "BSI-DSZ-CC-1118-2020"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2023-03-31",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1121V2ma01a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Swissbit TSE SMAERS Firmware"
      }
    ]
  },
  "manufacturer": "Swissbit AG",
  "manufacturer_web": "https://www.swissbit.com/de/",
  "name": "Swissbit TSE SMAERS Firmware",
  "not_valid_after": "2029-03-12",
  "not_valid_before": "2021-03-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1121V2c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1121-V2-2021": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0105-2019": 1
        }
      },
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20210323152435+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, Registrierkasse, TSE, PP 105, Swissbit AG",
      "/ModDate": "D:20210323152545+01\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certificate BSI-DSZ-CC-1121-V2-2021",
      "pdf_file_size_bytes": 250799,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1121V2a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 2 SOGIS Recognition Agreement",
        "cc_version": "PP conformant Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1121-V2-2021",
        "cert_item": "Swissbit TSE SMAERS Firmware",
        "cert_lab": "BSI",
        "developer": "Swissbit AG",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Security Module Application for Electronic Record- keeping Systems (SMAERS) Version 0.7.5, 6 March 2019, BSI-CC-PP-0105-2019"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1118-2020": 3,
          "BSI-DSZ-CC-1121-2019": 2,
          "BSI-DSZ-CC-1121-V2-2021": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0105-2019": 1,
          "BSI-CC-PP-0105-2019": 3
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMC.2": 1,
          "ALC_CMS.2": 1,
          "ALC_DEL": 2,
          "ALC_DEL.1": 1,
          "ALC_FLR": 1
        },
        "ATE": {
          "ATE_COV.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 6,
          "EAL 4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Report, Version 2.4, 11 March 2021, ETR Part Summary, MTG AG Pr\u00fcfstelle f\u00fcr IT-Sicherheit, (confidential document) [8] Security Module Application for Electronic Record-keeping Systems (SMAERS) Version 0.7.5, 6": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 8
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "MTG": {
          "MTG AG": 3
        },
        "TSystems": {
          "T-Systems International": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 1
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 32": 1,
          "AIS 46": 1,
          "AIS14": 1,
          "AIS19": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 197": 2,
          "FIPS PUB 180-4": 1,
          "FIPS PUB 197": 1
        },
        "ICAO": {
          "ICAO": 2
        },
        "ISO": {
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 7816-6": 1
        },
        "NIST": {
          "NIST SP 800-38B": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1,
          "BSI TR-03116": 4,
          "BSI TR-03151": 2,
          "BSI TR-03153": 2
        }
      },
      "tee_name": {
        "IBM": {
          "SE": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20210323151023+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Common Criteria, Certification, Zertifizierung, Registrierkasse, TSE, PP 105, Swissbit AG",
      "/ModDate": "D:20210323152414+01\u002700\u0027",
      "/Producer": "LibreOffice 6.3",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-1121-V2-2021",
      "pdf_file_size_bytes": 472698,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "http://www.commoncriteriaportal.org/",
          "https://nvlpubs.nist.gov/nistpubs/legacy/SP/nistspecialpublication800-90a.pdf",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/",
          "http://www.commoncriteriaportal.org/cc/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 26
    },
    "st_filename": "1121V2b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 7
          },
          "ECDSA": {
            "ECDSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.C": 1,
          "A.CSP": 1,
          "A.V": 1
        },
        "O": {
          "O.G": 1,
          "O.I": 1,
          "O.IA": 1,
          "O.IAA": 4,
          "O.T": 2,
          "O.TEE": 9,
          "O.TST": 2
        },
        "OE": {
          "OE.CSP": 3,
          "OE.ERS": 3,
          "OE.SUCP": 2
        },
        "T": {
          "T.M": 5
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 12,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 7,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 8,
          "FCS_COP.1.1": 1,
          "FCS_RNG.1": 5,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC": 25,
          "FDP_ACC.1": 23,
          "FDP_ACF": 14,
          "FDP_ACF.1": 15,
          "FDP_DAU": 4,
          "FDP_ETC": 15,
          "FDP_ETC.2": 7,
          "FDP_IFC.1": 16,
          "FDP_ITC": 20,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 18,
          "FDP_RIP": 7,
          "FDP_RIP.1": 1
        },
        "FIA": {
          "FIA_AFL": 1,
          "FIA_AFL.1": 4,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API.1": 5,
          "FIA_API.1.1": 1,
          "FIA_ATD": 1,
          "FIA_ATD.1": 7,
          "FIA_UAU": 6,
          "FIA_UAU.1": 5,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.5": 8,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 2,
          "FIA_UAU.6": 5,
          "FIA_UID": 1,
          "FIA_UID.1": 10,
          "FIA_UID.1.1": 2,
          "FIA_USB": 1,
          "FIA_USB.1": 4,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 2
        },
        "FMT": {
          "FMT_MOF": 1,
          "FMT_MOF.1": 12,
          "FMT_MOF.1.1": 4,
          "FMT_MSA": 2,
          "FMT_MSA.1": 16,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 5,
          "FMT_MSA.2.1": 3,
          "FMT_MSA.3": 13,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_MSA.4": 11,
          "FMT_MSA.4.1": 2,
          "FMT_MTD": 21,
          "FMT_MTD.1": 3,
          "FMT_MTD.3": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 1,
          "FMT_SMR.1": 18,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS": 1,
          "FPT_FLS.1": 10,
          "FPT_STM.1": 1,
          "FPT_STM.1.1": 1,
          "FPT_TDC": 1,
          "FPT_TDC.1": 14,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 2,
          "FPT_TEE": 1,
          "FPT_TEE.1": 25,
          "FPT_TEE.1.1": 1,
          "FPT_TEE.1.2": 1,
          "FPT_TRP.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 12,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 9,
          "FTP_ITC.1": 10,
          "FTP_TRP.1": 6
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "GCM": {
          "GCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 21
        },
        "TLS": {
          "TLS": {
            "TLS": 6,
            "TLS 1.2": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 3,
          "brainpoolP384r1": 1,
          "brainpoolP512r1": 1
        },
        "NIST": {
          "Curve P-256": 1,
          "Curve P-384": 1,
          "Curve P-521": 1,
          "P-256": 1,
          "P-384": 1,
          "P-521": 1
        }
      },
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {
        "LMS": {
          "LMS": 1
        }
      },
      "randomness": {
        "RNG": {
          "RNG": 6
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 180-4": 1,
          "FIPS 186-4": 1,
          "FIPS 197": 1,
          "FIPS PUB 198-1": 1
        },
        "ICAO": {
          "ICAO": 1
        },
        "ISO": {
          "ISO/IEC 18033-3": 1,
          "ISO/IEC 21827:2008": 1,
          "ISO/IEC 7816-3": 1
        },
        "NIST": {
          "NIST SP 800-38B": 1,
          "SP 800-38E": 1
        },
        "RFC": {
          "RFC-2986": 1,
          "RFC-5246": 2,
          "RFC-5280": 1,
          "RFC-5639": 4,
          "RFC-6816": 1,
          "RFC-8446": 2
        },
        "X509": {
          "X.509": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6,
            "AES-256": 2
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 2,
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-02102-1": 1,
          "BSI TR-03111": 1,
          "BSI TR-03116": 1,
          "BSI TR-03116-5": 1,
          "BSI TR-03145": 1,
          "BSI TR-03151": 1,
          "BSI TR-03153": 1
        }
      },
      "tee_name": {
        "IBM": {
          "SE": 1
        },
        "other": {
          "TEE": 9
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20201126193432+01\u002700\u0027",
      "/Creator": "Asciidoctor PDF 1.5.0.alpha.16, based on Prawn 2.2.2",
      "/ModDate": "D:20201126193432+01\u002700\u0027",
      "/Producer": "Asciidoctor PDF 1.5.0.alpha.16, based on Prawn 2.2.2",
      "/Title": "Swissbit TSE SMAERS Firmware - Common Criteria Security Target",
      "pdf_file_size_bytes": 1962768,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bzst.de/DE/Unternehmen/Aussenpruefungen/DigitaleSchnittstelleFinV/digitaleschnittstellefinv_node.html",
          "https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-90a.pdf",
          "https://www.debatin.de/wp-content/uploads/sites/4/2020/06/DEBASAFE-Sicherheitstaschen_dt.pdf",
          "https://csrc.nist.gov/CSRC/media/Projects/Cryptographic-Standards-and-Guidelines/documents/examples/Hash_DRBG.pdf"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 75
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0105b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1121V2a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1121V2b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2be805164e1f13204b012e0cbffc69efac66b456bfef21f0e7b0c34d9c2c18ff",
      "txt_hash": "6eeb32ace06e37f610c558919a36833bc36bcfcaae3a7d95cdc9a7a535e2d1a3"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a92c157cca0dc11327913469f00f53c3871ff8893de930ffcd9e410fcdc6acd8",
      "txt_hash": "74c7c22aea005e83f77aa83a6d212c4c6eceb21cd8f98bccc062de47dbd9b5a2"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a4aaf5314af7e2af144616564ae0f23bfdaf21a6cffbfe72d7a46e063785eb21",
      "txt_hash": "cd95ef1f5b884290fba9dd1f6eb8401d79bb15e07849ce5f8cf3d9e417746520"
    }
  },
  "status": "active"
}