This page was not yet optimized for use on mobile
devices.
PWPW SmartApp-ID 5.0 (MRTD configuration)
CSV information
| Status | active |
|---|---|
| Valid from | 25.04.2025 |
| Valid until | 25.04.2030 |
| Scheme | 🇳🇱 NL |
| Manufacturer | Polska Wytwórnia Papierów Wartościowych S.A. |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | AVA_VAN.5, EAL4+, ATE_DPT.2, ALC_DVS.2 |
| Protection profiles |
Heuristics summary
Certificate ID: NSCIB-CC-2300119-01-CR2
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Protocols
PACESecurity level
EAL4, EAL2, EAL 7, EAL4 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.3, ALC_FLR, ATE_DPT.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0068-V2-2011-MA-01Certificates
NSCIB-CC-2300119-01, NSCIB-2300119-01Evaluation facilities
TÜV InformationstechnikStandards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008Certification report
Extracted keywords
Protocols
PACEOperating System name
JCOP 4Vendor
NXPSecurity level
EAL4, EAL4+, EAL 4, EAL6+, EAL4 augmented, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ATE_DPT.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0056-V2-, BSI-CC-PP-0068-V2-2011-MA-01Certificates
BSI-DSZ-CC-1149-V3-2023, NSCIB-CC-2300119-01-CR2, NSCIB-2300119-01, NSCIB-CC-2300127-01, NSCIB-CC-2300127-01-CREvaluation facilities
TÜV InformationstechnikSide-channel analysis
JIL, JIL-AAPSStandards
ICAOFile metadata
| Title | Certification Report |
|---|---|
| Author | Microsoft Office User |
| Creation date | D:20250508160917+01'00' |
| Modification date | D:20250508160917+01'00' |
| Pages | 12 |
| Creator | Microsoft® Word 2021 |
| Producer | Microsoft® Word 2021 |
Frontpage
| Certificate ID | NSCIB-CC-2300119-01-CR2 |
|---|---|
| Certified item | PWPW SmartApp-ID 5.0 (MRTD configuration |
| Certification lab | TÜV Informationstechnik GmbH |
| Developer | Polska Wytwórnia Papierów Wartościowych S.A |
References
Outgoing- BSI-DSZ-CC-1149-V3-2023 - active - NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3)
- NSCIB-CC-2300127-01-CR - active - NXP JCOP 4.5 P71
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, 3DES, TripleDES, TDEA, KMAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512Schemes
MAC, Key AgreementProtocols
PACERandomness
RNG, RNDElliptic Curves
P-224, P-256, P-384, P-521, NIST P-224, NIST P-256, NIST P-384, NIST P-521, secp224r1, secp256r1, secp384r1, secp521r1Block cipher modes
CBC, CCMOperating System name
JCOP 4IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG14, EF.COM, EF.SODVendor
NXPSecurity level
EAL4, EAL 6+, EAL 4, EAL4 augmented, EAL 4 augmentedClaims
T.COM_EXPLOIT, T.CONFID-APLI-DATA, T.CONFID-JCS-DATA, T.INTEG-APLI-DATA, T.LIFE_CYCLE, T.MODULE_REPLACEMENT, T.OS_OPERATE, T.PHYSICAL, T.RESOURCES, T.SID, OT.ALARM, OT.CIPHER, OT.COMM_AUTH, OT.COMM_INTEGRITY, OT.DOMAIN-RIGHTS, OT.GLOBAL_ARRAYS_CONFID, OT.GLOBAL_ARRAYS_INTEG, OT.IDENTIFICATION, OT.KEY-MNGT, OT.OPERATE, OT.RESOURCES, OT.RND, OT.SCP, OT.TOE_IDENTIFICATION, OE.USE_DIAG, OSP.PROCESS-TOESecurity Assurance Requirements (SAR)
AGD_PRE.1, ALC_DVS.2, ALC_DEL.1, ATE_DPT.2, AVA_VAN.5, AVA_VAN.3Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FAU_ARP.1, FCS_CKM.1, FCS_CKM, FCS_COP, FCS_CKM.4, FCS_RND.1, FCS_CKM.4.1, FCS_COP.1, FCS_RND.1.1, FCS_RNG, FCS_RNG.1, FCS_CKM.1.1, FCS_COP.1.1, FDP_RIP.1, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_UCT, FDP_UIT, FDP_RIP.1.1, FDP_RIP, FDP_UCT.1, FDP_UIT.1, FDP_SDI.2, FIA_API.1, FIA_API, FIA_UAU, FIA_AFL, FIA_AFL.1, FIA_UID, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.6, FIA_API.1.1, FIA_ACC.1.1, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FMT_MTD, FMT_MTD.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR, FMT_SMR.1, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD.1, FMT_MTD.3.1, FPT_EMS.1, FPT_EMS, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_ITC.2Protection profiles
BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0084-2014, BSI-PP-0055Certificates
BSI-DSZ-CC-1149-V3-2023, BSI-DSZ-CC-1149, NSCIB-2300119, NSCIB-CC-2300127-01, NSCIB-2300120Evaluation facilities
TÜV Informationstechnik, TÜViT, TUViTSide-channel analysis
physical probing, DPA, Physical tampering, Malfunction, malfunction, fault injection, reverse engineeringCertification process
out of scope, Security Target Lite Page 10 of 90 Version 5.0.1.0 Developer not: SSCD functionality is out of scope of this document, it is described in a separate documentation [ASE SSCD]. 1.3.2 TOE definition The, with the MRTD and read the stored personal data of the TOE holder. 1 Signature functionality is out of scope of this document, it was described in a separate documentation. PUBLIC PWPW SmartApp-ID 5.0 (MRTD, functionalities are: SF.TerminalAuthentication. The signature specific security functionalities (out of scope of this documentation) are: SF.KeyManager. PWPW SmartApp-ID 5.0 (MRTD configuration): SecurityStandards
FIPS197, FIPS180-4, FIPS186-4, FIPS46-3, PKCS#3, RFC5639, ISO/IEC 9797-1, ISO/IEC 14443, ISO/IEC 7816, ISO/IEC 7816-2, ICAO, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Title | PWPW SmartApp-ID 5.0 (MRTD configuration) |
|---|---|
| Subject | Security Target Lite |
| Keywords | MRTD, Machine Readable Travel Document, e-Passport, Residence Permit |
| Author | Krzysztof Janowski |
| Creation date | D:20241104131900+01'00' |
| Modification date | D:20241104131900+01'00' |
| Pages | 90 |
| Creator | Microsoft® Word 2013 |
| Producer | Microsoft® Word 2013 |
References
Outgoing- BSI-DSZ-CC-1149-V3-2023 - active - NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1/R2/R3)
- NSCIB-CC-2300127-01-CR - active - NXP JCOP 4.5 P71
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
NSCIB-CC-2300119-01-CR2Extracted SARs
AGD_PRE.1, ALC_DEL.1, ALC_DVS.2, ATE_DPT.2, AVA_VAN.5References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300119-01.1-Cert.pdf",
"dgst": "cd577ab921fbc4a2",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-2300119-01-CR2",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"a33327d40f253f46",
"b380aabf93b29692"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1149-V3-2023",
"NSCIB-CC-2300127-01-CR"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1149-V3-2023",
"BSI-DSZ-CC-1149-2022",
"NSCIB-CC-2300127-01-CR",
"BSI-DSZ-CC-1149-V2-2023"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1149-V3-2023",
"NSCIB-CC-2300127-01-CR"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-1149-V3-2023",
"NSCIB-CC-2300127-01-CR"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Polska Wytw\u00f3rnia Papier\u00f3w Warto\u015bciowych S.A.",
"manufacturer_web": "https://www.pwpw.pl",
"name": "PWPW SmartApp-ID 5.0 (MRTD configuration)",
"not_valid_after": "2030-04-25",
"not_valid_before": "2025-04-25",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "NSCIB-CC-2300119-01.1-Cert.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"NSCIB-2300119-01": 1,
"NSCIB-CC-2300119-01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-V2-2012": 1,
"BSI-CC-PP-0068-V2-2011-MA-01": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.3": 1
},
"ATE": {
"ATE_DPT.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 7": 1,
"EAL2": 1,
"EAL4": 1,
"EAL4 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 2
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 18045:2008": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "NSCIB-CC-2300119-01-CR2.1.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-2300119-01-CR2",
"cert_item": "PWPW SmartApp-ID 5.0 (MRTD configuration",
"cert_lab": " T\u00dcV Informationstechnik GmbH",
"developer": "Polska Wytw\u00f3rnia Papier\u00f3w Warto\u015bciowych S.A"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1149-V3-2023": 2
},
"NL": {
"NSCIB-2300119-01": 2,
"NSCIB-CC-2300119-01-CR2": 12,
"NSCIB-CC-2300127-01": 1,
"NSCIB-CC-2300127-01-CR": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-V2-": 1,
"BSI-CC-PP-0068-V2-2011-MA-01": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 2
},
"ATE": {
"ATE_DPT.2": 2
},
"AVA": {
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL6+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 4
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 4": 5
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 2,
"JIL-AAPS": 1
}
},
"standard_id": {
"ICAO": {
"ICAO": 3
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 5
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Microsoft Office User",
"/CreationDate": "D:20250508160917+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20250508160917+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "Certification Report",
"pdf_file_size_bytes": 271056,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.sogis.eu/",
"https://trustcb.com/common-criteria/nscib/",
"mailto:[email protected]",
"https://nscib.nl/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 12
},
"st_filename": "NSCIB-CC-2300119-01-STlite.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDH": {
"ECDH": 24
},
"ECDSA": {
"ECDSA": 11
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 5
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1149": 1,
"BSI-DSZ-CC-1149-V3-2023": 3
},
"NL": {
"NSCIB-2300119": 1,
"NSCIB-2300120": 1,
"NSCIB-CC-2300127-01": 4
}
},
"cc_claims": {
"OE": {
"OE.USE_DIAG": 2
},
"OSP": {
"OSP.PROCESS-TOE": 2
},
"OT": {
"OT.ALARM": 2,
"OT.CIPHER": 2,
"OT.COMM_AUTH": 2,
"OT.COMM_INTEGRITY": 2,
"OT.DOMAIN-RIGHTS": 2,
"OT.GLOBAL_ARRAYS_CONFID": 2,
"OT.GLOBAL_ARRAYS_INTEG": 2,
"OT.IDENTIFICATION": 2,
"OT.KEY-MNGT": 2,
"OT.OPERATE": 2,
"OT.RESOURCES": 2,
"OT.RND": 2,
"OT.SCP": 4,
"OT.TOE_IDENTIFICATION": 2
},
"T": {
"T.COM_EXPLOIT": 2,
"T.CONFID-APLI-DATA": 2,
"T.CONFID-JCS-DATA": 2,
"T.INTEG-APLI-DATA": 2,
"T.LIFE_CYCLE": 2,
"T.MODULE_REPLACEMENT": 2,
"T.OS_OPERATE": 2,
"T.PHYSICAL": 2,
"T.RESOURCES": 2,
"T.SID": 4
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0056-V2-2012": 2,
"BSI-CC-PP-0068-V2-2011-MA-01": 2,
"BSI-CC-PP-0084-2014": 1,
"BSI-PP-0055": 1
}
},
"cc_sar": {
"AGD": {
"AGD_PRE.1": 1
},
"ALC": {
"ALC_DEL.1": 1,
"ALC_DVS.2": 3
},
"ATE": {
"ATE_DPT.2": 3
},
"AVA": {
"AVA_VAN.3": 1,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL 4 augmented": 1,
"EAL 6+": 2,
"EAL4": 1,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 2,
"FAU_SAS.1": 9,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM": 32,
"FCS_CKM.1": 5,
"FCS_CKM.1.1": 2,
"FCS_CKM.4": 8,
"FCS_CKM.4.1": 2,
"FCS_COP": 38,
"FCS_COP.1": 5,
"FCS_COP.1.1": 21,
"FCS_RND.1": 7,
"FCS_RND.1.1": 1,
"FCS_RNG": 1,
"FCS_RNG.1": 3
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 2,
"FDP_ACF": 5,
"FDP_ACF.1": 14,
"FDP_RIP": 1,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1,
"FDP_SDI.2": 2,
"FDP_UCT": 9,
"FDP_UCT.1": 1,
"FDP_UIT": 9,
"FDP_UIT.1": 5
},
"FIA": {
"FIA_ACC.1.1": 1,
"FIA_AFL": 5,
"FIA_AFL.1": 2,
"FIA_API": 2,
"FIA_API.1": 5,
"FIA_API.1.1": 1,
"FIA_UAU": 35,
"FIA_UAU.1": 4,
"FIA_UAU.4": 4,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 4,
"FIA_UAU.6": 2,
"FIA_UID": 4,
"FIA_UID.1": 4
},
"FMT": {
"FMT_LIM": 1,
"FMT_LIM.1": 7,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 7,
"FMT_LIM.2.1": 3,
"FMT_MTD": 29,
"FMT_MTD.1": 10,
"FMT_MTD.3": 5,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 2,
"FMT_SMF.1.1": 1,
"FMT_SMR": 5,
"FMT_SMR.1": 7
},
"FPT": {
"FPT_EMS": 1,
"FPT_EMS.1": 5,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 5,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 5,
"FPT_PHP.3.1": 1,
"FPT_TST.1": 5,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 2
},
"FTP": {
"FTP_ITC": 8,
"FTP_ITC.1": 6,
"FTP_ITC.2": 2
}
},
"certification_process": {
"OutOfScope": {
" Security Target Lite Page 10 of 90 Version 5.0.1.0 Developer not: SSCD functionality is out of scope of this document, it is described in a separate documentation [ASE SSCD]. 1.3.2 TOE definition The": 1,
"functionalities are: SF.TerminalAuthentication. The signature specific security functionalities (out of scope of this documentation) are: SF.KeyManager. PWPW SmartApp-ID 5.0 (MRTD configuration): Security": 1,
"out of scope": 3,
"with the MRTD and read the stored personal data of the TOE holder. 1 Signature functionality is out of scope of this document, it was described in a separate documentation. PUBLIC PWPW SmartApp-ID 5.0 (MRTD": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 10
},
"CCM": {
"CCM": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 110
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 3
},
"MAC": {
"MAC": 16
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-224": 2,
"NIST P-256": 2,
"NIST P-384": 2,
"NIST P-521": 2,
"P-224": 2,
"P-256": 2,
"P-384": 2,
"P-521": 2,
"secp224r1": 2,
"secp256r1": 2,
"secp384r1": 2,
"secp521r1": 2
}
},
"eval_facility": {
"TUV": {
"TUViT": 1,
"T\u00dcV Informationstechnik": 1,
"T\u00dcViT": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 11
},
"SHA2": {
"SHA-224": 6,
"SHA-256": 9,
"SHA-384": 5,
"SHA-512": 5
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 1,
"EF.DG1": 4,
"EF.DG14": 2,
"EF.DG16": 2,
"EF.DG2": 4,
"EF.DG3": 5,
"EF.DG4": 5,
"EF.DG5": 2,
"EF.SOD": 5
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 4": 14
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 2,
"RNG": 8
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 4,
"Physical tampering": 2,
"fault injection": 1,
"malfunction": 2
},
"SCA": {
"DPA": 1,
"physical probing": 5
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 2,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 2
},
"FIPS": {
"FIPS180-4": 6,
"FIPS186-4": 12,
"FIPS197": 4,
"FIPS46-3": 2
},
"ICAO": {
"ICAO": 9
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 7816": 2,
"ISO/IEC 7816-2": 2,
"ISO/IEC 9797-1": 2
},
"PKCS": {
"PKCS#3": 5
},
"RFC": {
"RFC5639": 14
},
"SCP": {
"SCP03": 12
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 35
}
},
"DES": {
"3DES": {
"3DES": 8,
"TDEA": 1,
"Triple-DES": 14,
"TripleDES": 3
},
"DES": {
"DES": 11
}
},
"constructions": {
"MAC": {
"CMAC": 9,
"KMAC": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 13
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Krzysztof Janowski",
"/CreationDate": "D:20241104131900+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/Keywords": "MRTD, Machine Readable Travel Document, e-Passport, Residence Permit",
"/ModDate": "D:20241104131900+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Subject": "Security Target Lite",
"/Title": "PWPW SmartApp-ID 5.0 (MRTD configuration)",
"pdf_file_size_bytes": 1741402,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 90
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300119-01-CR2.1.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"ATE_DPT.2",
"EAL4+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300119-01-STlite.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "f848abe866374d86c11a48d6c9004fc0ccac4acdc74ec19fc431194c1ae3bc09",
"txt_hash": "e0bfc406caf1818a3b8ccd4b5da2da003672b828893a58457c86ec5771d16886"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "a9d12e749a452695fd55df36b7ebd8c7574671e3bf7f09f7f318093fe4136c4d",
"txt_hash": "f0045fca60a416a739226521d672866c49f88fcb1fd48a67a56bd84dc780f660"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "c89c9667df698a6febda280d91ca75f72e3674881de677cb2a36e92a155aff13",
"txt_hash": "8e8ef09e1d19c1a3fa639d12016e519f2349e3347314160d7ebffdb299763224"
}
},
"status": "active"
}