{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0503107-CERT.pdf",
"dgst": "505cf4bb7f73e46d",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-0503107-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"4.1"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "NSCIB-CC-23-0503107-CR",
"cert_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2023/12/nscib-cc-0503107-cert.pdf",
"level": "EAL4 augmented with AVA_VAN.5, ALC_DVS.2 and ATE_DPT.2",
"manufacturer": "Rambus Inc.",
"manufacturer_link": "https://www.rambus.com",
"product": "PKE4 Core version 4.1",
"report_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2023/12/nscib-cc-0503107-cr.pdf",
"scheme": "NSCIB",
"target_link": "https://www.tuv-nederland.nl/assets/files/cerfiticaten/2023/12/st-lite-rambus_pke4_core_version_4.1_security_target_lite_revd.pdf"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Rambus Inc.",
"manufacturer_web": "https://www.rambus.com/",
"name": "Rambus PKE4 Core version 4.1",
"not_valid_after": "2028-12-11",
"not_valid_before": "2023-12-11",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "NSCIB-CC-0503107-CERT.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-23-0503107": 1
}
},
"cc_claims": {
"R": {
"R.L": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR.3": 2
},
"ATE": {
"ATE_DPT.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 1,
"EAL4 augmented": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
},
"SGS": {
"SGS": 1,
"SGS Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 1,
"ISO/IEC 15408-2": 1,
"ISO/IEC 15408-3": 1,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "kruitr",
"/CreationDate": "D:20231220083238+01\u002700\u0027",
"/Creator": "Bullzip PDF Printer (11.10.0.2761)",
"/ModDate": "D:20231220083308+01\u002700\u0027",
"/Producer": "PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH",
"/Title": "Microsoft Word - NSCIB-CC-0503107-CERT.doc",
"pdf_file_size_bytes": 266966,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "NSCIB-CC-0503107-CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-0503107-CR",
"cert_item": "PKE4 Core version 4.1",
"cert_lab": " SGS Brightsight B.V.",
"developer": "Rambus Inc"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 2
},
"EdDSA": {
"EdDSA": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {
"NL": {
"NSCIB-CC-0503107-CR": 12
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_IMP": 1
},
"ALC": {
"ALC_DVS.2": 2
},
"ATE": {
"ATE_DPT.2": 2,
"ATE_FUN": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 6,
"EAL4 augmented": 3,
"EAL4+": 7
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"PKE": {
"PKE": 4
}
},
"device_model": {},
"ecc_curve": {
"Curve": {
"Curve25519": 1
},
"Edwards": {
"Ed25519": 1,
"Ed448": 1
},
"NIST": {
"NIST P-192": 2,
"NIST P-224": 2,
"NIST P-256": 2,
"NIST P-384": 2,
"NIST P-521": 2,
"P-192": 2,
"P-224": 2,
"P-256": 2,
"P-384": 2,
"P-521": 2
}
},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
},
"SGS": {
"SGS": 2,
"SGS Brightsight": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {
"curves": {
"SM2": 1,
"X25519": 1,
"X448": 1
}
},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Fault Injection": 1
},
"SCA": {
"DPA": 1,
"side-channel": 1
},
"other": {
"JIL": 2,
"JIL-AAPS": 2,
"JIL-AM": 2
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "JM2",
"/CreationDate": "D:20231214140509+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/ModDate": "D:20231214140509+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"/Title": "Certification Report",
"pdf_file_size_bytes": 228518,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.sogis.eu/",
"mailto:[email protected]",
"http://www.tuv.com/nl"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
},
"st_filename": "[ST-LITE] Rambus_PKE4_Core_version_4.1_Security_Target_Lite_RevD.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 38
},
"ECDH": {
"ECDH": 11
},
"ECDSA": {
"ECDSA": 8
},
"EdDSA": {
"EdDSA": 9
}
},
"FF": {
"DH": {
"Diffie-Hellman": 6
},
"DSA": {
"DSA": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.RNG": 5
},
"D": {
"D.J": 1
},
"O": {
"O.ECC": 8,
"O.RSA": 7
},
"OE": {
"OE.RNG": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 3,
"ADV_FSP": 1,
"ADV_FSP.4": 2,
"ADV_IMP": 1,
"ADV_IMP.1": 2,
"ADV_TDS.3": 3
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 2,
"AGD_PRE": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS": 1,
"ALC_CMS.4": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 9,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 1,
"ATE_DPT.1": 2,
"ATE_DPT.2": 7,
"ATE_FUN.1": 2,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 11
}
},
"cc_security_level": {
"EAL": {
"EAL4": 10,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 34,
"FCS_CKM.1": 17,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 4,
"FCS_CKM.4": 28,
"FCS_CKM.4.1": 1,
"FCS_COP": 37,
"FCS_COP.1": 16,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC.1": 2,
"FDP_IFC.1": 15,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 1,
"FDP_ITC.1": 30,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITC.2": 6,
"FDP_ITT.1": 10,
"FDP_ITT.1.1": 1
},
"FMT": {
"FMT_MSA.3": 2
},
"FPT": {
"FPT_FLS.1": 13,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 10,
"FPT_ITT.1.1": 1
},
"FRU": {
"FRU_FLT.2": 11,
"FRU_FLT.2.1": 1
}
},
"certification_process": {
"OutOfScope": {
"240 in [PP] This refinement refers to configuration in Phase 2 or Phase 7. This refinement is out of scope for the TOE 241 in [PP] This refinement refers to downloading of embedded software. This refinement": 1,
"This refinement relates to requirements concerting embedded software. This requirement is regarded out of scope for the TOE. 235 in [PP] This refinement is applicable without any adjustments. Guidance documents": 1,
"contribute to SFRs. This refinement is regarded out of scope for the TOE. 217 in [PP] The ST redefines this refinement as follows. The Functional Specification": 1,
"in [PP] This refinement is out of scope for the TOE because it refers to the CMS refinement. 206 in [PP] This refinement is out of scope": 1,
"mechanisms. 218 in [PP] This refinement refers to operating conditions. This refinement is regarded out of scope for the TOE. ADV_IMP 223 in [PP] This refinement is applicable without any adjustments. It must be": 1,
"must be tested under different operating conditions within the specified ranges. This refinement is out of scope for the TOE. 227 in [PP] This refinement relates to physical testing. This refinement is out of": 1,
"out of scope": 12,
"out of scope for the TOE. AVA_VAN 245 in [PP] The ST redefines this refinement as follows. The vulnerability": 1,
"related to the development and production of the TOE. ALC_CMS 199 in [PP] This refinement is out of scope for the TOE because it relates to consumer software that can be part of manufacturing and delivery": 1,
"to test software delivered but not available in the operational phase. This refinement is regarded out of scope for the TOE. 216 in [PP] This refinement refers to features that do not provide functionality but": 1,
"transitions of power save modes if provided by the TOE. 210 in [PP] This refinement in [PP] is out of scope for the TOE because it relates to test features used in wafer testing. ADV_FSP 215 in [PP] This": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PGP": {
"PGP": 1
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"KEX": {
"Key exchange": 1
},
"PKE": {
"PKE": 36
}
},
"device_model": {},
"ecc_curve": {
"Curve": {
"Curve25519": 1
},
"Edwards": {
"Ed25519": 3,
"Ed448": 5
},
"NIST": {
"NIST P-192": 6,
"NIST P-224": 5,
"NIST P-256": 6,
"NIST P-384": 6,
"NIST P-521": 6,
"P-192": 6,
"P-224": 5,
"P-256": 6,
"P-384": 6,
"P-521": 6
}
},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {
"curves": {
"SM2": 16,
"X25519": 1,
"X448": 1
}
},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"PRNG": 7
},
"RNG": {
"RNG": 9
},
"TRNG": {
"TRNG": 5
}
},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1,
"fault injection": 1,
"malfunction": 1
},
"SCA": {
"DPA": 3,
"SPA": 1,
"side channel": 1,
"side-channel": 6,
"template attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 1
},
"CC": {
"CCMB-2017-04-0004": 1,
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS 140-2": 1,
"FIPS 186-4": 6,
"FIPS PUB 140-2": 1
},
"NIST": {
"NIST SP 800-186": 4
},
"PKCS": {
"PKCS#1": 4
},
"RFC": {
"RFC 5639": 5,
"RFC 7748": 4,
"RFC 8032": 5
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20231211070817-08\u002700\u0027",
"/Creator": "Microsoft\u00ae Word for Microsoft 365",
"/ModDate": "D:20231211070817-08\u002700\u0027",
"/Producer": "Microsoft\u00ae Word for Microsoft 365",
"/Subject": "Common Criteria Security Target Lite",
"/Title": "PKE V4.1 Security Target Lite",
"pdf_file_size_bytes": 606225,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"mailto:[email protected][email protected]",
"https://www.rambus.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 29
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0503107-CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"ATE_DPT.2",
"AVA_VAN.5",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-LITE]%20Rambus_PKE4_Core_version_4.1_Security_Target_Lite_RevD.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "cb5c1d93f843e322c01b6f69e94e167800f000a1946755263997dc821fbc9a68",
"txt_hash": "c0f63c82cacc49324428ea497c7d9a1824c17150ef2783b06acfae22bfd398b9"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "08e56e652604542cd86abb32a62cbd9b252ad245adce06fc4fed8cb8499f62ee",
"txt_hash": "57214fd9ab1d87d022a8c78bb7e1f75e53fa58f0ce9470a94e7a784cae982df5"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "dab96227607d1df65fa3c36a2455e06297a8c0502e6aaf413cb1e687aa18aaff",
"txt_hash": "759678166ca85e0f45eb1626908a470ba3afc477b2da1b93354ac6c5b8eede23"
}
},
"status": "active"
}