This page was not yet optimized for use on mobile
devices.
MaskTech ePP Applet on Secora ID S v1.1
CSV information
| Status | active |
|---|---|
| Valid from | 18.10.2022 |
| Valid until | 18.10.2027 |
| Scheme | 🇳🇱 NL |
| Manufacturer | MaskTech International GmbH |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL5, ALC_DVS.2, AVA_VAN.5 |
| Protection profiles |
Heuristics summary
Certificate ID: NSCIB-CC-0299277-CR
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Protocols
PACESecurity level
EAL5, EAL4, EAL2, EAL7, EAL5 augmented, EAL4 augmentedClaims
R.LSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.3, AVA_VAN.5Protection profiles
BSI-CC-PP-0055-2009, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0068-V2-2011-MA-01Certificates
CC-22-0299277Evaluation facilities
SGS, SGS Brightsight, BrightsightStandards
ISO/IEC 15408-1, ISO/IEC 15408-2, ISO/IEC 15408-3, ISO/IEC 18045Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, TDESAsymmetric Algorithms
ECDH, ECDSA, Diffie-HellmanHash functions
SHA-1, SHA-2Schemes
Key agreementProtocols
PACEVendor
Infineon, Infineon Technologies AGSecurity level
EAL4, EAL5, EAL5+, EAL4+, EAL 5, EAL 4, EAL6, EAL6+, EAL5 augmented, EAL4 augmented, EAL 5 augmented, EAL 4 augmented, EAL6 augmentedSecurity Assurance Requirements (SAR)
ADV_IMP, ALC_DVS.2, ALC_FLR.1, AVA_VAN.5, AVA_VAN.3Protection profiles
BSI-CC-PP-0055-2009, BSI-CC-PP-0056-V2-, BSI-CC-PP-0068-V2-2011-MA-01Certificates
BSI-DSZ-CC-1110-V5-2022, NSCIB-CC-0299277-CR, NSCIB-CC-21-175887-CR3Evaluation facilities
SGS, SGS Brightsight, Brightsight, TĂśV InformationstechnikSide-channel analysis
side channel, JIL, JIL-AAPS, JIL-AMCertification process
BSI-DSZ- CC- 1110-V5-2022, ETR for Composite evaluation (EFC), TÜV Informationstechnik GmbH (confidential document) [HW-ST] Public Security Target BSI-DSZ-CC-1110-V5-2022, Version 2.0, 2022-03-28, “Public SecurityStandards
AIS31, AIS 36, ICAO, SCP03File metadata
| Title | Certification Report |
|---|---|
| Author | Microsoft Office User |
| Creation date | D:20221020071406+01'00' |
| Modification date | D:20221020071406+01'00' |
| Pages | 13 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
Frontpage
| Certificate ID | NSCIB-CC-0299277-CR |
|---|---|
| Certified item | MaskTech ePP Applet on Secora™ ID S v1.1 |
| Certification lab | SGS Brightsight B.V. |
| Developer | MaskTech International GmbH |
References
Outgoing- BSI-DSZ-CC-1110-V5-2022 - active - Infineon Security Controller IFX_CCI_000003h, 000005h, 000008h, 00000Ch, 000013h, 000014h, 000015h, 00001Ch, 00001Dh, 000021h, 000022h in the design step H13 and including optional software libraries and dedicated firmware in several versions
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, 3DES, Triple-DES, TDEA, KMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, Diffie-Hellman, DHHash functions
SHA-1, SHA-2Schemes
MAC, Key agreement, Key AgreementProtocols
PACERandomness
RND, RNGBlock cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG15, EF.DG14, EF.DG13, EF.COM, EF.SODVendor
Infineon Technologies AG, InfineonSecurity level
EAL5, EAL4, EAL6, EAL5 augmented, EAL4 augmented, EAL6 augmentedClaims
O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.COMMUNICATION, O.CARD-MANAGEMENT, O.SCP, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, ADV_FSP.5, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_CMS.5, ALC_TAT.2, ALC_FLR.1, ATE_DPT.2, ATE_DPT.3, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN.3, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_SAS.1.1, FAU_ARP.1, FCO_NRO, FCS_COP, FCS_CKM.4, FCS_CKM.1, FCS_CKM, FCS_CKM.4.1, FCS_RND.1, FCS_RND.1.1, FCS_RND, FCS_CKM.2, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.3, FCS_RNG.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UIT.1, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_RIP.1, FDP_ACC, FDP_ACF, FDP_UCT, FDP_UIT, FDP_RIP.1.1, FDP_ITC, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_SDI.2, FIA_API, FIA_UAU.5.2, FIA_UAU.4, FIA_UAU, FIA_AFL.1, FIA_UAU.6, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.6.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UID, FIA_API.1, FIA_AFL, FIA_API.1.1, FIA_ACC.1.1, FIA_ATD, FIA_USB, FMT_MTD, FMT_SMF.1, FMT_SMF, FMT_SMR.1, FMT_SMR, FMT_MTD.1, FMT_MSA.3, FMT_SMR.1.1, FMT_SMR.1.2, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FMT_LIM.2.1, FMT_LIM.1.1, FMT_MTD.3, FMT_MTD.3.1, FMT_SMF.1.1, FMT_MSA, FPR_UNO.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3, FPT_PHP.3.1, FPT_FLS.1, FPT_FLS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TDC.1, FPT_RCV, FTP_ITC.1, FTP_TRP.1, FTP_ITCProtection profiles
BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0055-2009, BSI-CC-PP-0056-2009, BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01, ANSSI-CC-PP-2010/03-M01Certificates
BSI-DSZ-CC-S-0183-2021, BSI-DSZ-CC-S-0189-2021, BSI-DSZ-CC-S-0207-2021, ANSSI-CC-PP-2010/03-M01, NSCIB-CC-299277, CC-22-175887, NSCIB-CC-299278Side-channel analysis
physical probing, side channel, malfunctionCertification process
out of scope, to the plastic travel document is achieved by physical and organizational security measures being out of scope of the TOE. In the context of this Security Target the MRTD functionality is provided by theStandards
FIPS PUB 197, NIST SP 800-38A, NIST SP 800-67, AIS 31, RFC 2631, RFC 3369, ISO/IEC 7816-2, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC 9797, ICAO, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Title | Security Target – MaskTech ePP Applet on Secora™ ID S v1.1– Public version |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | Common Criteria, CC, Machine Readable Travel Document, MRTD, EAC with PACE, ePass, EAL4 +, EAL5 + |
| Author | MaskTech International GmbH |
| Creation date | D:20220923164121+02'00' |
| Modification date | D:20220923164121+02'00' |
| Pages | 107 |
| Creator | LaTeX with hyperref |
| Producer | pdfTeX-1.40.20 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
NSCIB-CC-0299277-CRExtracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-22-0299277-cert.pdf",
"dgst": "0fddd321be6a5a6c",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-0299277-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"b380aabf93b29692",
"60455fc9564e2545",
"184ca3dbcac741fa"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1110-V5-2022"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1110-V2-2019",
"BSI-DSZ-CC-0891-V2-2016",
"BSI-DSZ-CC-0945-2017",
"BSI-DSZ-CC-0782-2012",
"BSI-DSZ-CC-1110-2019",
"BSI-DSZ-CC-0945-V2-2018",
"BSI-DSZ-CC-0945-V3-2018",
"BSI-DSZ-CC-1110-V5-2022",
"BSI-DSZ-CC-0891-2015",
"BSI-DSZ-CC-1110-V4-2021",
"BSI-DSZ-CC-1110-V3-2020"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "MaskTech International GmbH",
"manufacturer_web": "https://www.masktech.de/",
"name": "MaskTech ePP Applet on Secora ID S v1.1",
"not_valid_after": "2027-10-18",
"not_valid_before": "2022-10-18",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "nscib-cc-22-0299277-cert.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-22-0299277": 1
}
},
"cc_claims": {
"R": {
"R.L": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055-2009": 2,
"BSI-CC-PP-0056-V2-2012": 1,
"BSI-CC-PP-0056-V2-2012-MA-02": 1,
"BSI-CC-PP-0068-V2-2011": 1,
"BSI-CC-PP-0068-V2-2011-MA-01": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 2,
"ALC_FLR.3": 2
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 1,
"EAL4 augmented": 1,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
},
"SGS": {
"SGS": 1,
"SGS Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 1,
"ISO/IEC 15408-2": 1,
"ISO/IEC 15408-3": 1,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "nscib-cc-0299277-cr-1.0.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-0299277-CR",
"cert_item": "MaskTech ePP Applet on Secora\u2122 ID S v1.1",
"cert_lab": " SGS Brightsight B.V.",
"developer": "MaskTech International GmbH"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1110-V5-2022": 2
},
"NL": {
"NSCIB-CC-0299277-CR": 13,
"NSCIB-CC-21-175887-CR3": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055-2009": 1,
"BSI-CC-PP-0056-V2-": 1,
"BSI-CC-PP-0068-V2-2011-MA-01": 1
}
},
"cc_sar": {
"ADV": {
"ADV_IMP": 1
},
"ALC": {
"ALC_DVS.2": 4,
"ALC_FLR.1": 1
},
"AVA": {
"AVA_VAN.3": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL 5": 1,
"EAL 5 augmented": 1,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL4+": 2,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL5+": 2,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"BSI-DSZ- CC- 1110-V5-2022, ETR for Composite evaluation (EFC), T\u00dcV Informationstechnik GmbH (confidential document) [HW-ST] Public Security Target BSI-DSZ-CC-1110-V5-2022, Version 2.0, 2022-03-28, \u201cPublic Security": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 16
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
},
"SGS": {
"SGS": 2,
"SGS Brightsight": 2
},
"TUV": {
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"SCA": {
"side channel": 1
},
"other": {
"JIL": 2,
"JIL-AAPS": 1,
"JIL-AM": 1
}
},
"standard_id": {
"BSI": {
"AIS 36": 1,
"AIS31": 2
},
"ICAO": {
"ICAO": 9
},
"SCP": {
"SCP03": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
},
"DES": {
"3DES": {
"TDES": 2
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 1,
"Infineon Technologies AG": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Microsoft Office User",
"/CreationDate": "D:20221020071406+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20221020071406+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Title": "Certification Report",
"pdf_file_size_bytes": 580881,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"http://www.tuv.com/nl",
"mailto:[email protected]",
"https://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "nscib-cc-0299277-stlite-1.2.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 7
},
"ECDSA": {
"ECDSA": 7
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 8
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-S-0183-2021": 1,
"BSI-DSZ-CC-S-0189-2021": 1,
"BSI-DSZ-CC-S-0207-2021": 1
},
"FR": {
"ANSSI-CC-PP-2010/03-M01": 1
},
"NL": {
"CC-22-175887": 4,
"NSCIB-CC-299277": 1,
"NSCIB-CC-299278": 1
}
},
"cc_claims": {
"O": {
"O.ALARM": 1,
"O.CARD-MANAGEMENT": 1,
"O.CIPHER": 1,
"O.COMMUNICATION": 1,
"O.DELETION": 1,
"O.FIREWALL": 1,
"O.GLOBAL_ARRAYS_CONFID": 1,
"O.GLOBAL_ARRAYS_INTEG": 1,
"O.INSTALL": 1,
"O.KEY-MNGT": 1,
"O.LOAD": 1,
"O.NATIVE": 1,
"O.OBJ-DELETION": 1,
"O.OPERATE": 1,
"O.PIN-MNGT": 1,
"O.REALLOCATION": 1,
"O.RESOURCES": 1,
"O.SCP": 4,
"O.SID": 1,
"O.TRANSACTION": 1
},
"OE": {
"OE.APPLET": 2,
"OE.CODE-EVIDENCE": 2,
"OE.VERIFICATION": 5
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03-M01": 1
},
"BSI": {
"BSI-CC-PP-0055-2009": 1,
"BSI-CC-PP-0056-2009": 1,
"BSI-CC-PP-0056-V2-2012-MA-02": 1,
"BSI-CC-PP-0068-V2-2011": 1,
"BSI-CC-PP-0068-V2-2011-MA-01": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 4,
"ADV_FSP.4": 2,
"ADV_FSP.5": 1,
"ADV_IMP.1": 3,
"ADV_INT.2": 1,
"ADV_TDS.3": 2,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 3,
"AGD_PRE.1": 3
},
"ALC": {
"ALC_CMC.4": 2,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 2,
"ALC_DVS.2": 16,
"ALC_FLR.1": 1,
"ALC_LCD.1": 2,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 2,
"ASE_ECD.1": 2,
"ASE_INT.1": 2,
"ASE_OBJ.2": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 2
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT.1": 1,
"ATE_DPT.2": 2,
"ATE_DPT.3": 2,
"ATE_FUN.1": 2,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN.3": 1,
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL4": 12,
"EAL4 augmented": 6,
"EAL5": 13,
"EAL5 augmented": 6,
"EAL6": 4,
"EAL6 augmented": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1,
"FAU_SAS": 3,
"FAU_SAS.1": 5,
"FAU_SAS.1.1": 1
},
"FCO": {
"FCO_NRO": 1
},
"FCS": {
"FCS_CKM": 20,
"FCS_CKM.1": 22,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 5,
"FCS_CKM.3": 1,
"FCS_CKM.4": 24,
"FCS_CKM.4.1": 1,
"FCS_COP": 64,
"FCS_COP.1": 30,
"FCS_RND": 1,
"FCS_RND.1": 6,
"FCS_RND.1.1": 1,
"FCS_RNG.1": 1
},
"FDP": {
"FDP_ACC": 10,
"FDP_ACC.1": 11,
"FDP_ACC.1.1": 1,
"FDP_ACF": 11,
"FDP_ACF.1": 24,
"FDP_ACF.1.1": 3,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC": 2,
"FDP_IFC.1": 4,
"FDP_IFF": 2,
"FDP_ITC": 3,
"FDP_ITC.1": 12,
"FDP_ITC.2": 12,
"FDP_RIP": 8,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1,
"FDP_ROL": 2,
"FDP_SDI.2": 1,
"FDP_UCT": 6,
"FDP_UCT.1": 6,
"FDP_UCT.1.1": 1,
"FDP_UIT": 8,
"FDP_UIT.1": 8,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 3
},
"FIA": {
"FIA_ACC.1.1": 1,
"FIA_AFL": 4,
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 8,
"FIA_API.1": 6,
"FIA_API.1.1": 1,
"FIA_ATD": 1,
"FIA_UAU": 47,
"FIA_UAU.1": 9,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 4,
"FIA_UAU.4": 11,
"FIA_UAU.4.1": 2,
"FIA_UAU.5": 15,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 3,
"FIA_UAU.6": 8,
"FIA_UAU.6.1": 1,
"FIA_UID": 13,
"FIA_UID.1": 10,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 5,
"FIA_USB": 1
},
"FMT": {
"FMT_LIM": 12,
"FMT_LIM.1": 17,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 16,
"FMT_LIM.2.1": 3,
"FMT_MSA": 11,
"FMT_MSA.3": 2,
"FMT_MTD": 80,
"FMT_MTD.1": 16,
"FMT_MTD.3": 6,
"FMT_MTD.3.1": 1,
"FMT_SMF": 7,
"FMT_SMF.1": 35,
"FMT_SMF.1.1": 1,
"FMT_SMR": 24,
"FMT_SMR.1": 13,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 1
},
"FPT": {
"FPT_EMS.1": 5,
"FPT_EMS.1.1": 2,
"FPT_EMS.1.2": 3,
"FPT_FLS": 7,
"FPT_FLS.1": 9,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 7,
"FPT_PHP.3.1": 1,
"FPT_RCV": 1,
"FPT_TDC.1": 1,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 8,
"FTP_ITC.1": 7,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"to the plastic travel document is achieved by physical and organizational security measures being out of scope of the TOE. In the context of this Security Target the MRTD functionality is provided by the": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 12
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 152
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1,
"Key agreement": 2
},
"MAC": {
"MAC": 14
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 5
},
"SHA2": {
"SHA-2": 3
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 13,
"EF.DG1": 19,
"EF.DG13": 1,
"EF.DG14": 2,
"EF.DG15": 2,
"EF.DG16": 18,
"EF.DG2": 8,
"EF.DG3": 15,
"EF.DG4": 17,
"EF.DG5": 7,
"EF.SOD": 15
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1,
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"malfunction": 3
},
"SCA": {
"physical probing": 2,
"side channel": 2
}
},
"standard_id": {
"BSI": {
"AIS 31": 3
},
"CC": {
"CCMB-2017-04-001": 2,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 2
},
"FIPS": {
"FIPS PUB 197": 1
},
"ICAO": {
"ICAO": 13
},
"ISO": {
"ISO/IEC 14443": 4,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-4": 1,
"ISO/IEC 9797": 2
},
"NIST": {
"NIST SP 800-38A": 1,
"NIST SP 800-67": 1
},
"RFC": {
"RFC 2631": 1,
"RFC 3369": 1
},
"SCP": {
"SCP03": 15
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 23
}
},
"DES": {
"3DES": {
"3DES": 6,
"TDEA": 1,
"TDES": 4,
"Triple-DES": 10
},
"DES": {
"DES": 6
}
},
"constructions": {
"MAC": {
"CMAC": 3,
"KMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 5,
"Infineon Technologies AG": 13
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "MaskTech International GmbH",
"/CreationDate": "D:20220923164121+02\u002700\u0027",
"/Creator": "LaTeX with hyperref",
"/Keywords": "Common Criteria, CC, Machine Readable Travel Document, MRTD, EAC with PACE, ePass, EAL4 +, EAL5 +",
"/ModDate": "D:20220923164121+02\u002700\u0027",
"/PTEX.Fullbanner": "This is pdfTeX, Version 3.14159265-2.6-1.40.20 (TeX Live 2019/Cygwin) kpathsea version 6.3.1",
"/Producer": "pdfTeX-1.40.20",
"/Subject": "Common Criteria Certification",
"/Title": "Security Target \u2013 MaskTech ePP Applet on Secora\u2122 ID S v1.1\u2013 Public version",
"/Trapped": "/False",
"pdf_file_size_bytes": 613317,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 107
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-06fr.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0299277-cr-1.0.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"EAL5",
"AVA_VAN.5",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0299277-stlite-1.2.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "ea8acaa5e4cb72e27bdaa4fa7c1b15111797ca760e0d2cd8967d6934563abeae",
"txt_hash": "ba3a475542c0cc07771573e056aced0a5bb31ade39d1c7c2666d0c3c7f90a6e4"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "94f7024ccfe5f9f03e1748b5aad17de554a5d7b4093de6f30bb5b9b9df5ad5a9",
"txt_hash": "2a8af2db40e83b2fcdbddcfbe5ccb68b68d92334b175f3dd47f3962ea1a2b266"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "3765bbc4d35390c5d6638aff217b3c342a35ba629ea65e9576ce85eb5e15ea92",
"txt_hash": "4f2f96c3fe21086bc694a6398eb270af30e6e99bd41e65a249239e7b6f5a776e"
}
},
"status": "active"
}