This page was not yet optimized for use on mobile
devices.
Veridos/Giesecke+Devrient Sm@rtCafé® Expert 8.0 C2
CSV information
| Status | active |
|---|---|
| Valid from | 24.05.2023 |
| Valid until | 24.05.2028 |
| Scheme | 🇳🇱 NL |
| Manufacturer | Veridos GmbH - Identity Solutions by Giesecke & Devrient and Bundesdruckerei |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL6+, ALC_FLR.1 |
| Protection profiles | |
| Maintenance updates | NSCIB-CC-2300006-01-MA1.1 (18.09.2023) Certification report Security target |
| Sm@rtCafé® Expert 8.0 C2 (18.09.2023) Certification report Security target |
Heuristics summary
Certificate ID: NSCIB-CC-2300005-01-CR
Certificate
Extracted keywords
Vendor
Giesecke+DevrientSecurity level
EAL6, EAL2, EAL7, EAL6 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR.3, ALC_FLRProtection profiles
BSI-CC-PP-0099-V2-2020Certificates
NSCIB-CC-23-2300005-01, NSCIB-2300005-01, CC-22-0289060Evaluation facilities
SGS, SGS Brightsight, BrightsightStandards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008File metadata
| Title | NSCIB Certificate |
|---|---|
| Author | Denise Cater |
| Creation date | D:20230813222548+01'00' |
| Modification date | D:20230813222548+01'00' |
| Pages | 1 |
| Creator | Microsoft® Word 2021 |
| Producer | Microsoft® Word 2021 |
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, CMAC, CBC-MACAsymmetric Algorithms
RSA-PSS, RSA-CRT, ECDH, ECDSA, EdDSA, ECCHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512Schemes
MACRandomness
RNGBlock cipher modes
ECB, CBC, GCMVendor
Giesecke+Devrient, G&DSecurity level
EAL4, EAL6, EAL6+, EAL5+, EAL 6, EAL6 augmented, EAL 6 augmentedSecurity Assurance Requirements (SAR)
ADV_IMP, ALC_FLR.1, AVA_VAN.5, AVA_VANCertificates
BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300005-01-CR, NSCIB-2300005-01Evaluation facilities
SGS, SGS Brightsight, BrightsightSide-channel analysis
side-channel, JIL-AM, JIL-AAPS, JILStandards
ISO/IEC 7816, ISO/IEC 14443File metadata
| Title | Certification Report |
|---|---|
| Author | JM2 |
| Creation date | D:20230531205700+01'00' |
| Modification date | D:20230531205700+01'00' |
| Pages | 13 |
| Creator | Microsoft® Word 2021 |
| Producer | Microsoft® Word 2021 |
Frontpage
| Certificate ID | NSCIB-CC-2300005-01-CR |
|---|---|
| Certified item | Sm@rtCafé® Expert 8.0 C2 |
| Certification lab | SGS Brightsight B.V. |
| Developer | Giesecke+Devrient Mobile Security GmbH |
References
Outgoing- BSI-DSZ-CC-1107-V3-2022 - active - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance
- NSCIB-CC-2300051-01-CR - active - ePass Applet on Sm@rtCafé® Expert 8.0 C2 v1.0
Security target
Extracted keywords
Symmetric Algorithms
AES, RC2, DES, 3DES, 3-DES, Triple-DES, TDES, TDEA, CBC-MAC, CMACAsymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3-224, SHA-3-256, SHA-3-384, SHA-3-512, SHA-3Schemes
MAC, Key AgreementRandomness
TRNG, RNG, RNDBlock cipher modes
ECB, CBC, CTR, CFBJavaCard versions
Java Card 2.2.2JavaCard API constants
TYPE_ACCESSVendor
Infineon Technologies AG, Infineon, G+D, Giesecke+Devrient, G&DSecurity level
EAL6+, EAL 6+, EAL6, EAL 4+, EAL 6, EAL6 augmented, EAL 6 augmentedClaims
D.APP_I_DATA, D.APP_CODE, D.SEC_DATA, D.PIN, D.CRYPTO, O.CARD-, O.SCP, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.ARRAY_VIEWS_CONFID, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.RNG, O.KEY-MNGT, O.PIN-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.CARD-MANAGEMENT, O.PIN-, O.ARRAY_VIEWS_INTEG, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, O.CODE_CAP_, O.CODE_CAP, O.JAVAOBJEC, O.GLOBAL_ARRAYS, O.KEY-, O.PINMNGT, O.RND, O.TDES, O.AES, T.SECURE_DELETION, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-APPLI-, T.INTEG-APPLI-, T.CONFID-, T.INTEGJCS-DATA, T.EXECODE, T.OBJDELETION, T.INTEG-, T.INTEGAPPLI-DATA, T.INTEGAPPLI-CODE, T.INTEG-JCS-, T.INTEG-JCSCODE, A.CAP_FILE, A.DELETION, A.VERIFICATION, R.JAVA, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_T_LOAD, OP.ARRAY_T_ASTORE, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.ARRAY_T_ALOAD, OP.PUTFIELD, OP.PUTSTATIC, OP.PUT, OE.CARD-MANAGEMENT, OE.SCP, OE.CAP_FILE, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.CODE-, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_SPM.1, ADV_FSP.4, ADV_ARC, ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.5, ADV_IMP.1, ADV_IMP.2, ADV_TDS.3, ADV_INT.3, ADV_FSP.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_DVS.2, ALC_CMC.5, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.3, ATE_FUN.1, ATE_FUN.2, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_INT.2, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FAU_SAS.1, FCO_NRO, FCO_NRO.2, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_CKM.2, FCS_CKM, FCS_COP, FDP_ACC, FDP_ACC.2, FDP_ACF, FDP_ACF.1, FDP_IFC, FDP_IFC.1, FDP_IFF, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL.1, FDP_ROL, FDP_SDI, FDP_SDI.2, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ACC.1, FDP_ITC.1, FDP_ITT.1, FDP_SDC.1, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_UID.2, FIA_USB, FIA_USB.1, FIA_UID.1, FIA_API.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FMT_SMR, FMT_SMF, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FPR_UNO.1, FPR_UNO.1.1, FPT_PHP.3, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_RCV, FPT_RCV.3, FPT_PHP.3.1, FPT_TST.2, FPT_ITT.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.3, FTP_TRP.1Protection profiles
BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0084-2014Certificates
BSI-DSZ-CC-1107-V3-2022Side-channel analysis
Leak-Inherent, physical probing, physical tampering, Malfunction, JILCertification process
out of scope, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are, with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Veridos Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05.2023 Page 59, 384, 521}r1[SEC2], brainpoolP{224, 256, 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Veridos Security Target Sm@rtCafé® Expert 8.0 C2/Version 4.0/Status 10.05.2023 Page 62, 3 [AIS20],[AIS31]12 that implements13 : 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10Standards
FIPS 186-4, FIPS 197, FIPS180-4, FIPS PUB 202, FIPS 140-2, PKCS1, PKCS5, PKCS3, AIS20, AIS31, AIS 31, AIS 20, RFC5639, RFC 5639, RFC 4056, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9796-2, SCP02, SCP03, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-001File metadata
| Title | Veridos Security Target |
|---|---|
| Subject | Sm@rtCafé® Expert 8.0 C2 |
| Keywords | Version 4.0/Status 10.05.2023 |
| Author | G+D MS / stut |
| Creation date | D:20230510173940+02'00' |
| Modification date | D:20230510173940+02'00' |
| Pages | 134 |
| Creator | Microsoft® Word für Microsoft 365 |
| Producer | Microsoft® Word für Microsoft 365 |
References
Outgoing- BSI-DSZ-CC-1107-V3-2022 - active - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0 & 80.306.16.1, optional NRG SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.15.000 and v2.11.003, optional ACL v3.33.003 and v3.02.000, optional RCL v1.10.007, optional HCL v1.13.002 and guidance
- NSCIB-CC-2300086-01-CR - active - Veridos Suite v4.0 - cryptovision ePasslet Suite – Java Card applet configuration providing Machine-Readable Electronic Documents based on BSI TR-03110 for Official Use with BAC option
- NSCIB-CC-2300087-01-CR - active - Veridos Suite v4.0 - cryptovision ePasslet Suite - Java Card applet configuration providing Machine-Readable Electronic Documents „ICAO Application”, Extended Access Control with PACE
- NSCIB-CC-2300089-01-CR - active - Veridos Suite v4.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key import (SSCD)
- NSCIB-CC-2300088-01-CR - active - Veridos Suite v4.0 – cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD)
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
NSCIB-CC-2300005-01-CRExtracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.1, ALC_LCD.1, ALC_TAT.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.2, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| Giesecke+Devrient Sm@rtCafé® Expert 8.0 C2 | NSCIB-CC-2300006-01-CR | Compare |
| Veridos/Giesecke+Devrient MS Sm@rtCafé® Expert 8.0 C1 | NSCIB-CC-0289060-CR | Compare |
Scheme data
| Cert Id | NSCIB-CC-23-2300005-01-CR | |
|---|---|---|
| Certification Date | 24.05.2023 | |
| Status | Issued | |
| Product | Sm@rtCafé® Expert 8.0 C2 | |
| Developer | Veridos GmbH | |
| Evaluation Facility | SGS Brightsight | |
| Level | EAL6+ALC_FLR.1 | |
| Cert Link | https://trustcb.com/download/?wpdmdl=3126 | |
| Report Link | https://trustcb.com/download/?wpdmdl=2868 | |
| Target Link | https://trustcb.com/download/?wpdmdl=2869 | |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300005-01.1-Cert.pdf",
"dgst": "cf59c92c2f7b1511",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-2300005-01-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL6+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"8.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"7f886b64878b68c1"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300051-01-CR"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1107-V3-2022"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300051-01-CR"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1107-V3-2022"
]
}
},
"scheme_data": {
"cert_id": "NSCIB-CC-23-2300005-01-CR",
"cert_link": "https://trustcb.com/download/?wpdmdl=3126",
"certification_date": "2023-05-24",
"developer": "Veridos GmbH",
"evaluation_facility": "SGS Brightsight",
"level": "EAL6+ALC_FLR.1",
"product": "Sm@rtCaf\u00e9\u00ae Expert 8.0 C2",
"report_link": "https://trustcb.com/download/?wpdmdl=2868",
"status": "Issued",
"target_link": "https://trustcb.com/download/?wpdmdl=2869"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300086-01-CR",
"NSCIB-CC-2300088-01-CR",
"NSCIB-CC-2300089-01-CR",
"NSCIB-CC-2300087-01-CR"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1107-V3-2022"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300086-01-CR",
"NSCIB-CC-2300087-01-CR",
"NSCIB-CC-2300089-01-CR",
"NSCIB-CC-2300088-01-CR"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1107-V3-2022"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2023-09-18",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300005-01-MA1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300005-01-STv42.pdf",
"maintenance_title": "Sm@rtCaf\u00e9\u00ae Expert 8.0 C2"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2023-09-18",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300006-01-MA1.1.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300005-01-STv42.pdf",
"maintenance_title": "NSCIB-CC-2300006-01-MA1.1"
}
]
},
"manufacturer": "Veridos GmbH - Identity Solutions by Giesecke \u0026 Devrient and Bundesdruckerei",
"manufacturer_web": "https://www.veridos.com",
"name": "Veridos/Giesecke+Devrient Sm@rtCaf\u00e9\u00ae Expert 8.0 C2",
"not_valid_after": "2028-05-24",
"not_valid_before": "2023-05-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "NSCIB-CC-2300005-01.1-Cert.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"CC-22-0289060": 1,
"NSCIB-2300005-01": 1,
"NSCIB-CC-23-2300005-01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0099-V2-2020": 1
}
},
"cc_sar": {
"ALC": {
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
},
"SGS": {
"SGS": 1,
"SGS Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 18045:2008": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"Giesecke+Devrient": 1
}
},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Denise Cater",
"/CreationDate": "D:20230813222548+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20230813222548+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "NSCIB Certificate",
"pdf_file_size_bytes": 94594,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.tuv-nederland.nl/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "NSCIB-CC-2300005-01-CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-2300005-01-CR",
"cert_item": "Sm@rtCaf\u00e9\u00ae Expert 8.0 C2",
"cert_lab": " SGS Brightsight B.V.",
"developer": "Giesecke+Devrient Mobile Security GmbH"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 4
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 2
},
"EdDSA": {
"EdDSA": 1
}
},
"RSA": {
"RSA-CRT": 2,
"RSA-PSS": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1107-V3-2022": 2
},
"NL": {
"NSCIB-2300005-01": 1,
"NSCIB-CC-2300005-01-CR": 13
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_IMP": 1
},
"ALC": {
"ALC_FLR.1": 3
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 1,
"EAL 6 augmented": 1,
"EAL4": 1,
"EAL5+": 1,
"EAL6": 2,
"EAL6 augmented": 2,
"EAL6+": 4
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
},
"ECB": {
"ECB": 3
},
"GCM": {
"GCM": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 3
},
"SGS": {
"SGS": 3,
"SGS Brightsight": 3
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
},
"SHA2": {
"SHA-224": 1,
"SHA-256": 1,
"SHA-384": 1,
"SHA-512": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"SCA": {
"side-channel": 1
},
"other": {
"JIL": 2,
"JIL-AAPS": 2,
"JIL-AM": 2
}
},
"standard_id": {
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"3DES": 2
},
"DES": {
"DES": 3
}
},
"constructions": {
"MAC": {
"CBC-MAC": 3,
"CMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 4,
"Giesecke+Devrient": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "JM2",
"/CreationDate": "D:20230531205700+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20230531205700+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "Certification Report",
"pdf_file_size_bytes": 223768,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"https://www.sogis.eu/",
"http://www.commoncriteriaportal.org/",
"https://www.tuv-nederland.nl/common-criteria/certificates.html",
"https://trustcb.com/common-criteria/nscib/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "NSCIB-CC-2300005-01-ST.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 9
},
"ECDH": {
"ECDH": 9
},
"ECDSA": {
"ECDSA": 8
}
},
"FF": {
"DH": {
"Diffie-Hellman": 2
}
},
"RSA": {
"RSA-CRT": 12
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1107-V3-2022": 2
}
},
"cc_claims": {
"A": {
"A.CAP_FILE": 6,
"A.DELETION": 7,
"A.VERIFICATION": 6
},
"D": {
"D.APP_CODE": 1,
"D.APP_I_DATA": 2,
"D.CRYPTO": 2,
"D.PIN": 1,
"D.SEC_DATA": 1
},
"O": {
"O.AES": 1,
"O.ALARM": 22,
"O.APPLET": 16,
"O.ARRAY_VIEWS_CONFID": 11,
"O.ARRAY_VIEWS_INTEG": 9,
"O.CARD-": 6,
"O.CARD-MANAGEMENT": 27,
"O.CIPHER": 15,
"O.CODE_CAP": 1,
"O.CODE_CAP_": 1,
"O.CODE_CAP_FILE": 12,
"O.DELETION": 17,
"O.FIREWALL": 43,
"O.GLOBAL_ARRAYS": 1,
"O.GLOBAL_ARRAYS_CONFID": 19,
"O.GLOBAL_ARRAYS_INTEG": 9,
"O.INSTALL": 16,
"O.JAVAOBJEC": 1,
"O.JAVAOBJECT": 46,
"O.KEY-": 8,
"O.KEY-MNGT": 15,
"O.LOAD": 19,
"O.NATIVE": 14,
"O.OBJ-DELETION": 9,
"O.OPERATE": 36,
"O.PIN-": 5,
"O.PIN-MNGT": 18,
"O.PINMNGT": 1,
"O.REALLOCATION": 18,
"O.RESOURCES": 23,
"O.RND": 4,
"O.RNG": 11,
"O.SCP": 64,
"O.SID": 33,
"O.TDES": 2,
"O.TRANSACTION": 19
},
"OE": {
"OE.CAP_FILE": 9,
"OE.CARD-MANAGEMENT": 6,
"OE.CODE-": 5,
"OE.CODE-EVIDENCE": 15,
"OE.SCP": 13,
"OE.VERIFICATION": 38
},
"OP": {
"OP.ARRAY_AASTORE": 3,
"OP.ARRAY_ACCESS": 4,
"OP.ARRAY_LENGTH": 4,
"OP.ARRAY_T_ALOAD": 2,
"OP.ARRAY_T_ASTORE": 3,
"OP.ARRAY_T_LOAD": 1,
"OP.CREATE": 7,
"OP.DELETE_APPLET": 4,
"OP.DELETE_CAP_FILE": 3,
"OP.DELETE_CAP_FILE_APPLET": 3,
"OP.INSTANCE_FIELD": 3,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 6,
"OP.JAVA": 6,
"OP.PUT": 5,
"OP.PUTFIELD": 1,
"OP.PUTSTATIC": 1,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 5
},
"OSP": {
"OSP.VERIFICATION": 7
},
"R": {
"R.JAVA": 14
},
"T": {
"T.CONFID-": 8,
"T.CONFID-APPLI-": 1,
"T.CONFID-APPLI-DATA": 17,
"T.CONFID-JCS-CODE": 3,
"T.CONFID-JCS-DATA": 4,
"T.DELETION": 4,
"T.EXE-CODE": 6,
"T.EXECODE": 1,
"T.INSTALL": 5,
"T.INTEG-": 10,
"T.INTEG-APPLI-": 4,
"T.INTEG-APPLI-CODE": 5,
"T.INTEG-APPLI-DATA": 13,
"T.INTEG-JCS-": 2,
"T.INTEG-JCS-CODE": 4,
"T.INTEG-JCS-DATA": 3,
"T.INTEG-JCSCODE": 1,
"T.INTEGAPPLI-CODE": 2,
"T.INTEGAPPLI-DATA": 1,
"T.INTEGJCS-DATA": 6,
"T.NATIVE": 5,
"T.OBJ-DELETION": 2,
"T.OBJDELETION": 1,
"T.PHYSICAL": 3,
"T.RESOURCES": 7,
"T.SECURE_DELETION": 8,
"T.SID": 16
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-CC-PP-0099-V2-2020": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 5,
"ADV_ARC.1": 5,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 3,
"ADV_FSP.5": 9,
"ADV_IMP.1": 6,
"ADV_IMP.2": 2,
"ADV_INT.3": 1,
"ADV_SPM.1": 3,
"ADV_TDS.1": 2,
"ADV_TDS.3": 3,
"ADV_TDS.4": 1,
"ADV_TDS.5": 6
},
"AGD": {
"AGD_OPE.1": 7,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.5": 3,
"ALC_CMS.1": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR.1": 6,
"ALC_LCD.1": 3,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 2
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 3,
"ASE_INT.2": 2,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 2,
"ATE_COV.3": 1,
"ATE_DPT.1": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 6,
"ATE_FUN.2": 1
},
"AVA": {
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4+": 1,
"EAL 6": 3,
"EAL 6 augmented": 2,
"EAL 6+": 1,
"EAL6": 4,
"EAL6 augmented": 2,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 21,
"FAU_ARP.1.1": 1,
"FAU_SAA.1": 3,
"FAU_SAS.1": 1
},
"FCO": {
"FCO_NRO": 6,
"FCO_NRO.2": 3
},
"FCS": {
"FCS_CKM": 7,
"FCS_CKM.1": 36,
"FCS_CKM.2": 4,
"FCS_CKM.4": 29,
"FCS_CKM.4.1": 1,
"FCS_COP": 8,
"FCS_COP.1": 118,
"FCS_RNG": 5,
"FCS_RNG.1": 13,
"FCS_RNG.1.1": 5,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC": 30,
"FDP_ACC.1": 11,
"FDP_ACC.2": 5,
"FDP_ACF": 29,
"FDP_ACF.1": 13,
"FDP_IFC": 31,
"FDP_IFC.1": 13,
"FDP_IFC.2": 2,
"FDP_IFF": 23,
"FDP_IFF.1": 17,
"FDP_ITC": 12,
"FDP_ITC.1": 8,
"FDP_ITC.2": 20,
"FDP_ITT.1": 1,
"FDP_RIP": 139,
"FDP_RIP.1": 11,
"FDP_ROL": 16,
"FDP_ROL.1": 5,
"FDP_SDC.1": 2,
"FDP_SDI": 15,
"FDP_SDI.2": 4,
"FDP_UIT": 9,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_API.1": 1,
"FIA_ATD": 10,
"FIA_ATD.1": 2,
"FIA_UID": 16,
"FIA_UID.1": 9,
"FIA_UID.2": 1,
"FIA_USB": 9,
"FIA_USB.1": 3
},
"FMT": {
"FMT_LIM": 4,
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA": 101,
"FMT_MSA.1": 10,
"FMT_MSA.2": 2,
"FMT_MSA.3": 17,
"FMT_MTD": 22,
"FMT_MTD.1": 2,
"FMT_MTD.3": 1,
"FMT_SMF": 22,
"FMT_SMF.1": 20,
"FMT_SMF.1.1": 1,
"FMT_SMR": 35,
"FMT_SMR.1": 32,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 10,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 39,
"FPT_FLS.1": 21,
"FPT_FLS.1.1": 2,
"FPT_ITT.1": 1,
"FPT_PHP.3": 9,
"FPT_PHP.3.1": 3,
"FPT_RCV": 13,
"FPT_RCV.3": 10,
"FPT_TDC.1": 8,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 2,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1,
"FPT_TST.2": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 14,
"FTP_ITC.1": 8,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"3 [AIS20],[AIS31]12 that implements13 : 8 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 9 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. 10": 1,
"384, 521}r1[SEC2], brainpoolP{224, 256, 7 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Veridos Security Target Sm@rtCaf\u00e9\u00ae Expert 8.0 C2/Version 4.0/Status 10.05.2023 Page 62": 1,
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are": 1,
"out of scope": 5,
"with ECDH is part of this SFR. 6 The shorter key lengths 160 and 192 are supported but are out of scope of the TOE. Veridos Security Target Sm@rtCaf\u00e9\u00ae Expert 8.0 C2/Version 4.0/Status 10.05.2023 Page 59": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"CFB": {
"CFB": 5
},
"CTR": {
"CTR": 5
},
"ECB": {
"ECB": 9
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 10
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 4
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 4,
"SHA-384": 4,
"SHA-512": 4
},
"SHA3": {
"SHA-3": 1,
"SHA-3-224": 3,
"SHA-3-256": 3,
"SHA-3-384": 2,
"SHA-3-512": 3
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"javacard": {
"javacard.framework": 5,
"javacard.framework.applet": 1,
"javacard.security": 7
},
"javacardx": {
"javacardx.crypto": 1
}
},
"javacard_version": {
"JavaCard": {
"Java Card 2.2.2": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 4,
"RNG": 17
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"physical tampering": 5
},
"SCA": {
"Leak-Inherent": 2,
"physical probing": 1
},
"other": {
"JIL": 2
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 31": 2,
"AIS20": 7,
"AIS31": 5
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2
},
"FIPS": {
"FIPS 140-2": 1,
"FIPS 186-4": 7,
"FIPS 197": 10,
"FIPS PUB 202": 4,
"FIPS180-4": 3
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816": 2,
"ISO/IEC 9796-2": 1
},
"PKCS": {
"PKCS1": 12,
"PKCS3": 1,
"PKCS5": 3
},
"RFC": {
"RFC 4056": 1,
"RFC 5639": 1,
"RFC5639": 5
},
"SCP": {
"SCP02": 4,
"SCP03": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 29
},
"RC": {
"RC2": 1
}
},
"DES": {
"3DES": {
"3-DES": 7,
"3DES": 3,
"TDEA": 1,
"TDES": 3,
"Triple-DES": 4
},
"DES": {
"DES": 14
}
},
"constructions": {
"MAC": {
"CBC-MAC": 10,
"CMAC": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"GD": {
"G\u0026D": 10,
"G+D": 6,
"Giesecke+Devrient": 6
},
"Infineon": {
"Infineon": 1,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "G+D MS / stut",
"/CreationDate": "D:20230510173940+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word f\u00fcr Microsoft 365",
"/Keywords": "Version 4.0/Status 10.05.2023",
"/ModDate": "D:20230510173940+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word f\u00fcr Microsoft 365",
"/Subject": "Sm@rtCaf\u00e9\u00ae Expert 8.0 C2",
"/Title": "Veridos Security Target",
"pdf_file_size_bytes": 1825407,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 134
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300005-01-CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL6+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300005-01-ST.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d57f2e0f73908ac34a7b577771370cedde9002cf0f3712b08c770e1a3c0a45be",
"txt_hash": "fc130690967be0a578d4afa254d2d194bf9c03e4b060fe359b1fd3725e280847"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "2a9b230eadf9c70281ee063820c67d2bdc76f7797b720c7303e57f38cb99c56f",
"txt_hash": "94582416853c51169a78f091e9be8110027188dcf09371853e0fb76739437d76"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "aab655f5c23aa721f4f27629a1290ea25de425a9d5a0d4ce29c8a29e4164955e",
"txt_hash": "b80880f21a61b5d52d637ef4fffdad679cf62b380307026f2e32467cf105b986"
}
},
"status": "active"
}