This page was not yet optimized for use on mobile
devices.
IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
CSV information
| Status | archived |
|---|---|
| Valid from | 19.11.2018 |
| Valid until | 19.11.2023 |
| Scheme | 🇳🇱 NL |
| Manufacturer | Idemia |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ATE_DPT.3, EAL4+, ADV_FSP.5, ADV_TDS.4, ADV_INT.2, ALC_CMS.5, ALC_TAT.2, ALC_DVS.2 |
| Protection profiles |
Heuristics summary
Certificate ID: NSCIB-CC-196231-CR
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL2, EAL7Claims
O.MSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ALC_DVS.2, ALC_CMS.5, ALC_TAT.2, ATE_DPT.3Certificates
CC-18-196231Evaluation facilities
BrightsightStandards
ISO/IEC 15408, ISO/IEC 18045, ICAOCertification report
Extracted keywords
Hash functions
SHA-2Libraries
v1.02.013Vendor
Infineon, IDEMIASecurity level
EAL4, EAL4+, EAL 4, EAL4 augmented, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMS.5, ALC_TAT.2, ATE_DPT.3, AVA_VAN.5Protection profiles
BSI-CC-PP-0055Certificates
ANSSI-CC-2018/27, NSCIB-CC-196231-CR, CC-195748, CC-19-180045Evaluation facilities
Brightsight, CESTISide-channel analysis
side channel, fault injection, JILVulnerabilities
ROCACertification process
out of scope, of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation isStandards
ISO/IEC 18013, ICAOFile metadata
| Title | Certification Report NSCIB-CC-196231-CR |
|---|---|
| Author | p646 |
| Creation date | D:20181120153406+01'00' |
| Modification date | D:20181120153406+01'00' |
| Pages | 13 |
| Creator | PDFCreator Version 1.2.0 |
| Producer | GPL Ghostscript 9.0 |
Frontpage
| Certificate ID | NSCIB-CC-196231-CR |
|---|---|
| Certified item | IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration |
| Certification lab | Brightsight |
| Developer | IDEMIA |
References
Outgoing- NSCIB-CC-195748-CR - archived - Ideal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration)
Security target
Extracted keywords
Symmetric Algorithms
AES-, AES, AES-128, DES, 3DES, Triple-DES, KMAC, CMACAsymmetric Algorithms
ECDSA, ECCHash functions
SHA-1, SHA1, SHA-224, SHA-384, SHA-512, SHA224, SHA256, SHA384, SHA512, SHA-256, SHA-2Schemes
MACProtocols
PACE, PGPRandomness
RNDLibraries
v1.02.013Block cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG15, EF.DG13, EF.DG14, EF.COM, EF.SODVendor
Infineon, IDEMIASecurity level
EAL4, EAL5, EAL4 augmentedClaims
A.MRTD_, OE.AA_MRTD, OE.MRTD_Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_SPM.1, ADV_ARC.1, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_CMS.5, ALC_TAT.2, ATE_DPT.3Security Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_COP, FCS_CKM.1, FCS_RND.1, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FCS_CKM, FDP_ACF.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UIT.1, FDP_UCT.1.1, FDP_IFC.1, FDP_UIT, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC, FIA_API, FIA_SOS.2, FIA_API.1, FIA_API.1.1, FIA_UAU.5.2, FIA_UAU.4, FIA_UAU.6, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.6.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU, FMT_LIM, FMT_MTD, FMT_SMR.1, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MSA.1, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_RVM.1, FPT_SEP.1, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-PP-0055, BSI-PP-0056, BSI-CC-PP- 0055-2009, BSI-CC-PP-0056-V2-2012-MA-02, BSI-PP-0035Certificates
ANSSI-CC-2018/27, CC-1, CC-2, CC-3Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringCertification process
out of scope, of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security featuresStandards
FIPS 180-4, FIPS 46-3, FIPS46, FIPS PUB 197, AIS31, RFC3369, RFC-5639, RFC 5639, ISO/IEC 18013, ISO/IEC 7816-2, ISO/IEC 14443, ISO/IEC 7816-4, ISO/IEC15946-2, ICAO, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Title | Security Target Lite IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration) |
|---|---|
| Subject | ASE Lite 2018_2000037746, v1.0, 2018-09-07 |
| Keywords | NSCIB-CC-196231, ASE Lite, ICAO, ePassport, BAC |
| Author | IDEMIA |
| Creation date | D:20180907132327+02'00' |
| Modification date | D:20180907132327+02'00' |
| Pages | 102 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
NSCIB-CC-196231-CRExtracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_INT.2, ADV_SPM.1, ADV_TDS.4, ALC_CMS.5, ALC_DVS.2, ALC_TAT.2, ATE_DPT.3, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| IDeal Pass v2.3-n JC with Privacy Protection (BAC Configuration) | NSCIB-CC-180045-CR2 | Compare |
| Ideal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration) | NSCIB-CC-195748-CR | Compare |
| IDeal Pass v2.3-n JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration) | NSCIB-CC-180351-CR2 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-196231.pdf",
"dgst": "ce867531085e33f8",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-196231-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.3"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"60455fc9564e2545"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-195748-CR"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-195748-CR"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Idemia",
"manufacturer_web": "https://www.idemia.com",
"name": "IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)",
"not_valid_after": "2023-11-19",
"not_valid_before": "2018-11-19",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "Signed certificate CC-18-196231.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-18-196231": 1
}
},
"cc_claims": {
"O": {
"O.M": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.5": 1,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"ALC": {
"ALC_CMS.5": 1,
"ALC_DVS.2": 1,
"ALC_TAT.2": 1
},
"ATE": {
"ATE_DPT.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ICAO": {
"ICAO": 1
},
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC 18045": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "Certification Report NSCIB-CC-196231-CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-196231-CR",
"cert_item": "IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration",
"cert_lab": " Brightsight",
"developer": "IDEMIA"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2018/27": 1
},
"NL": {
"CC-19-180045": 1,
"CC-195748": 2,
"NSCIB-CC-196231-CR": 12
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055": 1
}
},
"cc_sar": {
"ADV": {
"ADV_FSP.5": 2,
"ADV_INT.2": 2,
"ADV_TDS.4": 2
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMS.5": 2,
"ALC_DVS.2": 2,
"ALC_TAT.2": 2
},
"ATE": {
"ATE_DPT.3": 2
},
"AVA": {
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL4+": 2
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation is": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 4
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 2
},
"CESTI": {
"CESTI": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"fault injection": 1
},
"SCA": {
"side channel": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"ICAO": {
"ICAO": 6
},
"ISO": {
"ISO/IEC 18013": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 6
},
"Infineon": {
"Infineon": 3
}
},
"vulnerability": {
"ROCA": {
"ROCA": 2
}
}
},
"report_metadata": {
"/Author": "p646",
"/CreationDate": "D:20181120153406+01\u002700\u0027",
"/Creator": "PDFCreator Version 1.2.0",
"/Keywords": "",
"/ModDate": "D:20181120153406+01\u002700\u0027",
"/Producer": "GPL Ghostscript 9.0",
"/Subject": "",
"/Title": "Certification Report NSCIB-CC-196231-CR",
"pdf_file_size_bytes": 630780,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "[ST-BAC-Lite] 2018_2000037746 - Security Target Lite IDeal Pass v2.3-i JC (BAC Configuration) (v1.0, 2018-09-07).pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 12
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2018/27": 2
},
"NL": {
"CC-1": 6,
"CC-2": 3,
"CC-3": 3
}
},
"cc_claims": {
"A": {
"A.MRTD_": 1
},
"OE": {
"OE.AA_MRTD": 6,
"OE.MRTD_": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0055-2009": 1,
"BSI-CC-PP-0056-V2-2012-MA-02": 1,
"BSI-PP-0035": 1,
"BSI-PP-0055": 1,
"BSI-PP-0056": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.5": 4,
"ADV_INT.2": 4,
"ADV_SPM.1": 1,
"ADV_TDS.4": 4
},
"AGD": {
"AGD_OPE": 10,
"AGD_PRE": 9
},
"ALC": {
"ALC_CMS.5": 4,
"ALC_DVS.2": 5,
"ALC_TAT.2": 4
},
"ATE": {
"ATE_DPT.3": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 6,
"EAL4 augmented": 2,
"EAL5": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 7,
"FAU_SAS.1": 11,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 30,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 22,
"FCS_CKM.4.1": 1,
"FCS_COP": 51,
"FCS_COP.1": 9,
"FCS_RND": 9,
"FCS_RND.1": 13,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC.1": 18,
"FDP_ACC.1.1": 1,
"FDP_ACF": 1,
"FDP_ACF.1": 13,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 4,
"FDP_ITC": 2,
"FDP_ITC.1": 12,
"FDP_ITC.2": 12,
"FDP_UCT.1": 11,
"FDP_UCT.1.1": 1,
"FDP_UIT": 1,
"FDP_UIT.1": 10,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 3,
"FIA_AFL.1.2": 3,
"FIA_API": 16,
"FIA_API.1": 5,
"FIA_API.1.1": 1,
"FIA_SOS.2": 1,
"FIA_UAU": 6,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 16,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 10,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 4,
"FIA_UAU.6": 12,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 12,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 8,
"FMT_LIM.1": 18,
"FMT_LIM.1.1": 3,
"FMT_LIM.2": 19,
"FMT_LIM.2.1": 4,
"FMT_MSA.1": 1,
"FMT_MSA.2": 1,
"FMT_MSA.3": 3,
"FMT_MTD": 35,
"FMT_MTD.1": 5,
"FMT_SMF.1": 18,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 19,
"FMT_SMR.1.1": 3,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS.1": 1,
"FPT_EMS.1.1": 1,
"FPT_EMS.1.2": 1,
"FPT_FLS.1": 10,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 10,
"FPT_PHP.3.1": 1,
"FPT_RVM.1": 1,
"FPT_SEP.1": 1,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 2
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_TRP.1": 5
}
},
"certification_process": {
"OutOfScope": {
"of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security features": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 8
}
},
"crypto_protocol": {
"PACE": {
"PACE": 16
},
"PGP": {
"PGP": 1
}
},
"crypto_scheme": {
"MAC": {
"MAC": 24
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3,
"SHA1": 1
},
"SHA2": {
"SHA-2": 2,
"SHA-224": 2,
"SHA-256": 1,
"SHA-384": 2,
"SHA-512": 1,
"SHA224": 1,
"SHA256": 1,
"SHA384": 1,
"SHA512": 1
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 9,
"EF.DG1": 27,
"EF.DG13": 4,
"EF.DG14": 3,
"EF.DG15": 8,
"EF.DG16": 27,
"EF.DG2": 10,
"EF.DG3": 7,
"EF.DG4": 6,
"EF.DG5": 8,
"EF.SOD": 9
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"Physical Tampering": 5,
"Physical tampering": 1,
"fault injection": 1,
"malfunction": 7,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 4,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 4
},
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1,
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 180-4": 2,
"FIPS 46-3": 2,
"FIPS PUB 197": 1,
"FIPS46": 1
},
"ICAO": {
"ICAO": 20
},
"ISO": {
"ISO/IEC 14443": 6,
"ISO/IEC 18013": 6,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-4": 1,
"ISO/IEC15946-2": 1
},
"RFC": {
"RFC 5639": 1,
"RFC-5639": 1,
"RFC3369": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 11,
"AES-": 1,
"AES-128": 1
}
},
"DES": {
"3DES": {
"3DES": 7,
"Triple-DES": 13
},
"DES": {
"DES": 4
}
},
"constructions": {
"MAC": {
"CMAC": 4,
"KMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 16
},
"Infineon": {
"Infineon": 22
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "IDEMIA",
"/CreationDate": "D:20180907132327+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/Keywords": "NSCIB-CC-196231, ASE Lite, ICAO, ePassport, BAC",
"/ModDate": "D:20180907132327+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "ASE Lite 2018_2000037746, v1.0, 2018-09-07",
"/Title": "Security Target Lite IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)",
"pdf_file_size_bytes": 1486764,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 102
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-196231-CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"EAL4+",
"ADV_TDS.4",
"ATE_DPT.3",
"ADV_INT.2",
"ALC_DVS.2",
"ALC_TAT.2",
"ALC_CMS.5",
"ADV_FSP.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-BAC-Lite]%202018_2000037746%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(BAC%20Configuration)%20(v1.0,%202018-09-07).pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "85d2349952b6f2c642a503a4928d6a010bae6c523c598ec96a628e073a431952",
"txt_hash": "51f4cb96f7f6bbad728664cc6b0c6d117d958ca33ba51bf3c1517fb0f5cf5406"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "e3b0534b1fda3edb8e85b8e67074226c5574000476637c2d16c1caae82aca7d6",
"txt_hash": "541a3cafe80ad85199954a277f4ad3c5bcf305e5f6c9ce2b9c23d85340d73221"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "b52db9b83c21691e6ed5c422aa8ac1aea366b51a6d2f189f30085c68e37421a1",
"txt_hash": "4889220fca8cae085783a119f2299abbdf6450754046c0e99e4f4a5ff2aa65e8"
}
},
"status": "archived"
}