This page was not yet optimized for use on mobile
devices.
Ideal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration)
CSV information
| Status | archived |
|---|---|
| Valid from | 19.11.2018 |
| Valid until | 19.11.2023 |
| Scheme | 🇳🇱 NL |
| Manufacturer | Idemia |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL5+, ALC_DVS.2, AVA_VAN.5 |
| Protection profiles |
Heuristics summary
Certificate ID: NSCIB-CC-195748-CR
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Protocols
PACESecurity level
EAL7Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Protection profiles
BSI-CC-PP- 0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-Certificates
CC-18-195748Evaluation facilities
BrightsightStandards
ISO/IEC 15408, ISO/IEC 18045, ICAOCertification report
Extracted keywords
Hash functions
SHA-2Protocols
PACELibraries
v1.02.013Vendor
Infineon, IDEMIASecurity level
EAL4, EAL5, EAL5+, EAL 5, EAL5 augmented, EAL 5 augmentedSecurity Assurance Requirements (SAR)
AGD_OPE, AGD_PRE, ALC_DVS.2, AVA_VAN.5, AVA_VANProtection profiles
BSI-CC-PP-0068-V2, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-MA-01Certificates
ANSSI-CC-2018/27, NSCIB-CC-195748-CR, CC-19-180351Evaluation facilities
Brightsight, CESTISide-channel analysis
side channel, fault injection, JILVulnerabilities
ROCACertification process
out of scope, of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. Page: 9/13 of report number: NSCIB-CC-195748-CRStandards
ISO/IEC 18013, ICAOFile metadata
| Title | Certification Report NSCIB-CC-195748-CR |
|---|---|
| Author | p646 |
| Creation date | D:20181120152710+01'00' |
| Modification date | D:20181120152710+01'00' |
| Pages | 13 |
| Creator | PDFCreator Version 1.2.0 |
| Producer | GPL Ghostscript 9.0 |
Frontpage
| Certificate ID | NSCIB-CC-195748-CR |
|---|---|
| Certified item | IDeal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration |
| Certification lab | Brightsight |
| Developer | IDEMIA |
References
Incoming- NSCIB-CC-196231-CR - archived - IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
Security target
Extracted keywords
Symmetric Algorithms
AES, AES-128, 3DES, Triple-DES, KMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-HellmanHash functions
SHA1, SHA-1, SHA224, SHA256, SHA384, SHA512, SHA-224, SHA-256, SHA-384, SHA-512, SHA-2Schemes
MAC, Key AgreementProtocols
PACE, PGPLibraries
v1.02.013Block cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG15, EF.DG14, EF.DG13, EF.COM, EF.SODVendor
Infineon, IDEMIASecurity level
EAL5, EAL 5+, EAL5 augmentedClaims
OE.AA_MRTDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_COP, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_CKM.2, FDP_ACF, FDP_ACC, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_RIP, FDP_ACF.1.2, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FIA_API, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_AFL, FIA_AFL.1, FIA_UID, FIA_UID.1, FIA_UAU, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FMT_LIM, FMT_MTD, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR, FMT_SMR.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MTD.1, FMT_MTD.3, FMT_MTD.3.1, FMT_MSA.3, FMT_MSA.1, FPR_ANO.1, FPR_ANO.1.1, FPR_UNL.1, FPR_UNL.1.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0068-V2-, BSI-CC-PP-0068-V2, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0055-2009, BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0086, BSI-PP-0035Certificates
BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27, CC-1, CC-2, CC-3Side-channel analysis
physical probing, SPA, DPA, timing attacks, Physical Tampering, Malfunction, malfunctionCertification process
out of scope, of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security featuresStandards
FIPS 180-4, PKCS#3, AIS31, RFC 2631, RFC-5639, RFC3369, RFC 5639, ISO/IEC 18013, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC15946-2, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003Technical reports
BSI TR-03110File metadata
| Title | Security Target Lite IDeal Pass v2.3-i JC (SAC/EAC/Polymorphic eMRTD Configuration) |
|---|---|
| Subject | ASE-Lite 2018_2000037744, v1.0, 2018-09-07 |
| Keywords | NSCIB-CC-195748, ASE Lite, ICAO, ePassport, SAC, EAC, PCA-eMRTD, Polymorphic eMRTD |
| Author | IDEMIA |
| Creation date | D:20180907132439+02'00' |
| Modification date | D:20180907132439+02'00' |
| Pages | 151 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
References
Outgoing- BSI-DSZ-CC-0782-V4-2018 - archived - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003, EC v1.02.013 or v2.07.003, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003, and Toolbox v1.02.013 or v2.07.003 libraries and with specific IC dedicated software (firmware)
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
NSCIB-CC-195748-CRExtracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| IDeal Pass v2.3-n JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration) | NSCIB-CC-180351-CR2 | Compare |
| IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration) | NSCIB-CC-196231-CR | Compare |
| IDeal Pass v2.3-n JC with Privacy Protection (BAC Configuration) | NSCIB-CC-180045-CR2 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-195748.pdf",
"dgst": "8385fe63bf12b96b",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-195748-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.3"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"a33327d40f253f46",
"b380aabf93b29692"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-196231-CR"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-196231-CR"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-V4-2018"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0782-V4-2018"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Idemia",
"manufacturer_web": "https://www.idemia.com",
"name": "Ideal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration)",
"not_valid_after": "2023-11-19",
"not_valid_before": "2018-11-19",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "Signed certificate CC-18-195748.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-18-195748": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0056-V2-2012-MA-02": 1,
"BSI-CC-PP-0068-V2-2011-": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 2
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "Certification Report NSCIB-CC-195748-CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-195748-CR",
"cert_item": "IDeal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration",
"cert_lab": " Brightsight",
"developer": "IDEMIA"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2018/27": 1
},
"NL": {
"CC-19-180351": 1,
"NSCIB-CC-195748-CR": 12
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-V2-2012": 1,
"BSI-CC-PP-0068-V2": 1,
"BSI-CC-PP-0068-V2-MA-01": 1
}
},
"cc_sar": {
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_DVS.2": 2
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL 5 augmented": 1,
"EAL4": 1,
"EAL5": 1,
"EAL5 augmented": 1,
"EAL5+": 2
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. Page: 9/13 of report number: NSCIB-CC-195748-CR": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 4
}
},
"crypto_protocol": {
"PACE": {
"PACE": 6
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
},
"CESTI": {
"CESTI": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"fault injection": 1
},
"SCA": {
"side channel": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"ICAO": {
"ICAO": 6
},
"ISO": {
"ISO/IEC 18013": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 7
},
"Infineon": {
"Infineon": 3
}
},
"vulnerability": {
"ROCA": {
"ROCA": 2
}
}
},
"report_metadata": {
"/Author": "p646",
"/CreationDate": "D:20181120152710+01\u002700\u0027",
"/Creator": "PDFCreator Version 1.2.0",
"/Keywords": "",
"/ModDate": "D:20181120152710+01\u002700\u0027",
"/Producer": "GPL Ghostscript 9.0",
"/Subject": "",
"/Title": "Certification Report NSCIB-CC-195748-CR",
"pdf_file_size_bytes": 640598,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "[ST-EAC-Lite] 2018_2000037744 - Security Target Lite IDeal Pass v2.3-i JC (SAC EAC Polymorphic) (v1.0, 2018-09-07).pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 5
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 13
}
},
"FF": {
"DH": {
"DH": 4,
"Diffie-Hellman": 9
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782-V4-2018": 1
},
"FR": {
"ANSSI-CC-2018/27": 2
},
"NL": {
"CC-1": 6,
"CC-2": 3,
"CC-3": 3
}
},
"cc_claims": {
"OE": {
"OE.AA_MRTD": 9
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055-2009": 1,
"BSI-CC-PP-0056-V2-2012": 2,
"BSI-CC-PP-0056-V2-2012-MA-02": 1,
"BSI-CC-PP-0068-V2": 2,
"BSI-CC-PP-0068-V2-": 1,
"BSI-CC-PP-0068-V2-2011": 1,
"BSI-CC-PP-0068-V2-2011-MA-01": 2,
"BSI-CC-PP-0086": 1,
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 1,
"ADV_FSP.5": 8,
"ADV_IMP.1": 8,
"ADV_INT.2": 1,
"ADV_TDS.1": 2,
"ADV_TDS.3": 3,
"ADV_TDS.4": 8
},
"AGD": {
"AGD_OPE": 11,
"AGD_OPE.1": 5,
"AGD_PRE": 10,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 9,
"ALC_LCD.1": 3,
"ALC_TAT.1": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 10
}
},
"cc_security_level": {
"EAL": {
"EAL 5+": 1,
"EAL5": 7,
"EAL5 augmented": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 5,
"FAU_SAS.1": 12,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 57,
"FCS_CKM.1": 14,
"FCS_CKM.2": 3,
"FCS_CKM.4": 42,
"FCS_CKM.4.1": 1,
"FCS_COP": 84,
"FCS_COP.1": 12,
"FCS_RND": 6,
"FCS_RND.1": 22,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC": 25,
"FDP_ACC.1": 6,
"FDP_ACF": 28,
"FDP_ACF.1": 22,
"FDP_ACF.1.2": 1,
"FDP_IFC.1": 2,
"FDP_ITC.1": 8,
"FDP_ITC.2": 8,
"FDP_RIP": 6,
"FDP_RIP.1": 18,
"FDP_RIP.1.1": 1,
"FDP_UCT": 15,
"FDP_UCT.1": 1,
"FDP_UIT": 13,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 67,
"FIA_AFL.1": 12,
"FIA_API": 19,
"FIA_API.1": 5,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU": 123,
"FIA_UAU.1": 12,
"FIA_UAU.4": 2,
"FIA_UAU.5": 6,
"FIA_UAU.6": 3,
"FIA_UID": 28,
"FIA_UID.1": 8
},
"FMT": {
"FMT_LIM": 17,
"FMT_LIM.1": 19,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 18,
"FMT_LIM.2.1": 2,
"FMT_MSA.1": 1,
"FMT_MSA.3": 4,
"FMT_MTD": 153,
"FMT_MTD.1": 16,
"FMT_MTD.3": 8,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 52,
"FMT_SMF.1.1": 1,
"FMT_SMR": 44,
"FMT_SMR.1": 20
},
"FPR": {
"FPR_ANO.1": 4,
"FPR_ANO.1.1": 1,
"FPR_UNL.1": 4,
"FPR_UNL.1.1": 1
},
"FPT": {
"FPT_EMS": 5,
"FPT_EMS.1": 14,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 10,
"FPT_PHP.3.1": 1,
"FPT_TST.1": 8,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 17,
"FTP_ITC.1": 6,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security features": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 8
}
},
"crypto_protocol": {
"PACE": {
"PACE": 244
},
"PGP": {
"PGP": 1
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 3
},
"MAC": {
"MAC": 14
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1,
"SHA1": 2
},
"SHA2": {
"SHA-2": 2,
"SHA-224": 1,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1,
"SHA224": 2,
"SHA256": 2,
"SHA384": 2,
"SHA512": 2
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 4,
"EF.DG1": 11,
"EF.DG13": 1,
"EF.DG14": 5,
"EF.DG15": 3,
"EF.DG16": 10,
"EF.DG2": 5,
"EF.DG3": 13,
"EF.DG4": 13,
"EF.DG5": 4,
"EF.SOD": 9
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 4,
"Physical Tampering": 3,
"malfunction": 6
},
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 3,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 4
},
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1,
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS 180-4": 1
},
"ICAO": {
"ICAO": 27
},
"ISO": {
"ISO/IEC 14443": 6,
"ISO/IEC 18013": 6,
"ISO/IEC 7816-4": 1,
"ISO/IEC15946-2": 1
},
"PKCS": {
"PKCS#3": 1
},
"RFC": {
"RFC 2631": 1,
"RFC 5639": 1,
"RFC-5639": 3,
"RFC3369": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 16,
"AES-128": 2
}
},
"DES": {
"3DES": {
"3DES": 13,
"Triple-DES": 4
}
},
"constructions": {
"MAC": {
"CMAC": 7,
"KMAC": 4
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 5
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 17
},
"Infineon": {
"Infineon": 22
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "IDEMIA",
"/CreationDate": "D:20180907132439+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/Keywords": "NSCIB-CC-195748, ASE Lite, ICAO, ePassport, SAC, EAC, PCA-eMRTD, Polymorphic eMRTD",
"/ModDate": "D:20180907132439+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "ASE-Lite 2018_2000037744, v1.0, 2018-09-07",
"/Title": "Security Target Lite IDeal Pass v2.3-i JC (SAC/EAC/Polymorphic eMRTD Configuration)",
"pdf_file_size_bytes": 1925693,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 151
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-195748-CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL5+",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-EAC-Lite]%202018_2000037744%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(SAC%20EAC%20Polymorphic)%20(v1.0,%202018-09-07).pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "a5a501c7878df219586a539fa6093e04a59a3ee5b1b04ed1ecb3513c6ead9960",
"txt_hash": "e92f59e95fb9c0a5b24a004cbbbb2781dee87f003467bce1f666913bfa5a8ef3"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "11fa025fb2ed949975173d731400e3af6e8e245aac0894fd11e7d247d3a5cf5a",
"txt_hash": "48cce5ad30a58304602a426010fdccf790d3623b9102e2b23d162e18b821eeae"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "98a4ffb0b94cfc5bf96bc62a73f97c66d91c7b6ebde5365808b16065ab25cb51",
"txt_hash": "2f2d25fa3149a615517be92d631e880e0ddddb3dbc735cc8171290c832c5e349"
}
},
"status": "archived"
}