Certificate

Extracted keywords

Security level
EAL4, EAL2, EAL 7, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.3, ALC_FLR, ATE_DPT.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0059-, BSI-CC-PP-0075-, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-2013-MA-01
Certificates
NSCIB-CC-2300120-01, NSCIB-2300120-01
Evaluation facilities
TÜV Informationstechnik

Standards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008

File metadata

Title NSCIB Certificate
Author Microsoft Office User
Creation date D:20250502123740+01'00'
Modification date D:20250502123740+01'00'
Pages 1
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Certification report

Extracted keywords

Protocols
PACE

Operating System name
JCOP 4
Vendor
NXP

Security level
EAL4, EAL4+, EAL 4, EAL6+, EAL4 augmented, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ATE_DPT.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0076-2013-MA-01
Certificates
BSI-DSZ-CC-1149-V3-2023, NSCIB-CC-2300120-01-CR2, NSCIB-2300120-01, NSCIB-CC-2300127-01, NSCIB-CC-2300127-01-CR
Evaluation facilities
TÜV Informationstechnik

Side-channel analysis
JIL, JIL-AAPS

File metadata

Title Certification Report
Author Microsoft Office User
Creation date D:20250502124548+01'00'
Modification date D:20250502124548+01'00'
Pages 12
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Frontpage

Certificate ID NSCIB-CC-2300120-01-CR2
Certified item PWPW SmartApp-ID 5.0 (SIGN configuration
Certification lab TÜV Informationstechnik GmbH
Developer Polska Wytwórnia Papierów Wartościowych S.A

References

Outgoing

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES, TripleDES, TDEA, CMAC
Asymmetric Algorithms
RSA-1024, ECDH, ECDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-256, SHA-224, SHA-384, SHA-512
Schemes
MAC, Key Agreement, Key agreement
Protocols
PACE
Randomness
RNG, RND
Elliptic Curves
P-224, P-256, P-384, P-521, NIST P-224, NIST P-256, NIST P-384, NIST P-521, secp224r1, secp256r1, secp384r1, secp521r1
Block cipher modes
CBC, CCM

Operating System name
JCOP 4
IC data groups
EF.DG14
Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL 6+, EAL 4, EAL4 augmented, EAL 4 augmented
Claims
T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.SID, T.UNAUTHORIZED_CARD_MNGT, T.COM_EXPLOIT, T.PHYSICAL, T.LIFE_CYCLE, T.MODULE_REPLACEMENT, T.OS_OPERATE, T.RESOURCES, T.CONFID-APLI-DATA, T.UNAUTHORIZED_CARD_MNG, A.CGA, A.SCA, A.CSP, OT.ALARM, OT.CIPHER, OT.RND, OT.KEY-MNGT, OT.PIN-MNGT, OT.TRANSACTION, OT.COMM_AUTH, OT.COMM_INTEGRITY, OT.COMM_CONFIDENTIALITY, OT.GLOBAL_ARRAYS_CONFID, OT.GLOBAL_ARRAYS_INTEG, OT.DOMAIN-RIGHTS, OT.OPERATE, OT.RESOURCES, OT.SCP, OE.HID_VAD, OE.USE_DIAG, OE.USE_KEYS, OE.PROCESS_SEC_IC, OSP.PROCESS-TOE
Security Assurance Requirements (SAR)
ADV_ARC, ADV_ARC.1, AGD_PRE.1, ALC_DVS.2, ALC_DEL.1, ATE_DPT.2, AVA_VAN.5
Security Functional Requirements (SFR)
FAU_ARP.1, FCS_CKM, FCS_COP, FCS_RND.1, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_RND.1.1, FCS_RNG, FCS_RNG.1, FDP_ACC, FDP_ACF, FDP_UIT, FDP_RIP.1, FDP_SDI, FDP_DAU, FDP_ITC, FDP_UCT, FDP_ACC.1, FDP_ACF.1, FDP_UIT.1, FDP_RIP, FDP_RIP.1.1, FDP_SDI.2, FDP_DAU.2, FDP_ITC.1, FDP_UCT.1, FIA_UID, FIA_UAU, FIA_API, FIA_UID.1, FIA_UAU.1, FIA_AFL.1, FIA_API.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.6, FIA_AFL, FIA_AFL.1.1, FIA_AFL.1.2, FIA_API.1.1, FMT_SMR, FMT_MTD, FMT_LIM.1, FMT_LIM.2, FMT_LIM, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF, FMT_SMF.1.1, FMT_MOF, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4.1, FMT_MTD.1, FMT_MTD.1.1, FMT_LIM.1.1, FMT_LIM.2.1, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_EMS, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS, FPT_FLS.1.1, FPT_TST, FPT_PHP, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TEE.1, FPT_ITC, FPT_ITC.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.3
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-2013-MA-01, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0056-V2-2012, BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1149-V3-2023, BSI-DSZ-CC-1149, NSCIB-2300120, NSCIB-CC-2300127-01, NSCIB-2300119
Evaluation facilities
TÜV Informationstechnik

Side-channel analysis
physical probing, SPA, DPA, timing attacks, physical tampering, Malfunction, malfunction
Certification process
out of scope, MRTD) functionality is out of scope of this document, it is described in a separate documentation, grant access from ADF.MRTD level to ADF.SSCD and vice versa. Developer note MRTD functionality is out of scope of this document, it is described in a separate documentation [ASE MRTD]. 1.3.2 TOE definition The, package PWPW pl.pwpw.smartapp.id.sign 1 Machine Readable Travel Document (MRTD) functionality is out of scope of this document, it is described in a separate documentation. PWPW SmartApp-ID 5.0 (SIGN, Protection, SF.SEManager, SF.TrustedChannel. The e-passport specific security functionalities (out of scope of this documentation) are: SF.TerminalAuthentication. The signature specific security

Standards
FIPS186-4, FIPS197, FIPS180-4, FIPS46-3, PKCS#3, PKCS#1, PKCS #1, RFC5639, ISO/IEC 7816-2, ICAO, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title PWPW SmartApp-ID 5.0 (SIGN configuration)
Subject Security Target Lite
Author Krzysztof Janowski
Creation date D:20241105111047Z00'00'
Modification date D:20241204105037Z00'00'
Pages 111
Creator Microsoft® Word 2013
Producer macOS Version 14.6.1 (Build 23G93) Quartz PDFContext, AppendMode 1.1

References

Outgoing

Heuristics

Certificate ID: NSCIB-CC-2300120-01-CR2

Extracted SARs

ADV_ARC.1, AGD_PRE.1, ALC_DEL.1, ALC_DVS.2, ATE_DPT.2, AVA_VAN.5

Scheme data ?

Cert Id NSCIB-CC-2300120-01-CR
Certification Date 25.04.2025
Status Issued
Product PWPW SmartApp-ID 5.0 (SIGN configuration)
Developer Polska Wytwórnia Papierów Wartościowych S.A.
Evaluation Facility TÜV Informationstechnik
Level EAL4 + ATE_DPT.2 , ALC_DVS.2 and AVA_VAN.5
Cert Link https://trustcb.com/download/?wpdmdl=5127
Report Link https://trustcb.com/download/?wpdmdl=5128
Target Link https://trustcb.com/download/?wpdmdl=5129

References

Loading...

Updates

  • 02.06.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name PWPW SmartApp-ID 5.0 (SIGN configuration) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300120-01.1-Cert.pdf",
  "dgst": "b01177af3aa3bea2",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-2300120-01-CR2",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "d918b28fd7bb5d79",
        "27abdb9c6ab375a7",
        "d9553e7194783182",
        "4a814d0e3c9f9082",
        "1f7ea2e05de5b88b"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300127-01-CR",
          "BSI-DSZ-CC-1149-V3-2023"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-V2-2023",
          "NSCIB-CC-2300127-01-CR",
          "BSI-DSZ-CC-1149-2022",
          "BSI-DSZ-CC-1149-V3-2023"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "NSCIB-CC-2300120-01-CR",
      "cert_link": "https://trustcb.com/download/?wpdmdl=5127",
      "certification_date": "2025-04-25",
      "developer": "Polska Wytw\u00f3rnia Papier\u00f3w Warto\u015bciowych S.A.",
      "evaluation_facility": "T\u00dcV Informationstechnik",
      "level": "EAL4 + ATE_DPT.2 , ALC_DVS.2 and AVA_VAN.5",
      "product": "PWPW SmartApp-ID 5.0 (SIGN configuration)",
      "report_link": "https://trustcb.com/download/?wpdmdl=5128",
      "status": "Issued",
      "target_link": "https://trustcb.com/download/?wpdmdl=5129"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300127-01-CR",
          "BSI-DSZ-CC-1149-V3-2023"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300127-01-CR",
          "BSI-DSZ-CC-1149-V3-2023"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Polska Wytw\u00f3rnia Papier\u00f3w Warto\u015bciowych S.A.",
  "manufacturer_web": "https://www.pwpw.pl",
  "name": "PWPW SmartApp-ID 5.0 (SIGN configuration)",
  "not_valid_after": "2030-04-25",
  "not_valid_before": "2025-04-25",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "NSCIB-CC-2300120-01.1-Cert.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "NSCIB-2300120-01": 1,
          "NSCIB-CC-2300120-01": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-": 1,
          "BSI-CC-PP-0071-2012-MA-01": 1,
          "BSI-CC-PP-0072-2012-MA-01": 1,
          "BSI-CC-PP-0075-": 1,
          "BSI-CC-PP-0076-2013-MA-01": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.3": 1
        },
        "ATE": {
          "ATE_DPT.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 7": 1,
          "EAL2": 1,
          "EAL4": 1,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 18045:2008": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Microsoft Office User",
      "/CreationDate": "D:20250502123740+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20250502123740+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "NSCIB Certificate",
      "pdf_file_size_bytes": 128249,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "NSCIB-CC-2300120-01-CR2.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-2300120-01-CR2",
        "cert_item": "PWPW SmartApp-ID 5.0 (SIGN configuration",
        "cert_lab": " T\u00dcV Informationstechnik GmbH",
        "developer": "Polska Wytw\u00f3rnia Papier\u00f3w Warto\u015bciowych S.A"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1149-V3-2023": 2
        },
        "NL": {
          "NSCIB-2300120-01": 2,
          "NSCIB-CC-2300120-01-CR2": 12,
          "NSCIB-CC-2300127-01": 1,
          "NSCIB-CC-2300127-01-CR": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-02": 1,
          "BSI-CC-PP-0071-2012-MA-01": 1,
          "BSI-CC-PP-0076-2013-MA-01": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 2
        },
        "ATE": {
          "ATE_DPT.2": 2
        },
        "AVA": {
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 2,
          "EAL4 augmented": 1,
          "EAL4+": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 2
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 5
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JIL": 2,
          "JIL-AAPS": 1
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 5
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Microsoft Office User",
      "/CreationDate": "D:20250502124548+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20250502124548+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 280854,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "mailto:[email protected]",
          "https://www.sogis.eu/",
          "https://nscib.nl/",
          "https://trustcb.com/common-criteria/nscib/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 12
    },
    "st_filename": "NSCIB-CC-2300120-01-STlite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 6
          },
          "ECDH": {
            "ECDH": 21
          },
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 4
          }
        },
        "RSA": {
          "RSA-1024": 2
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1149": 1,
          "BSI-DSZ-CC-1149-V3-2023": 3
        },
        "NL": {
          "NSCIB-2300119": 1,
          "NSCIB-2300120": 1,
          "NSCIB-CC-2300127-01": 4
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 3,
          "A.CSP": 2,
          "A.SCA": 3
        },
        "OE": {
          "OE.HID_VAD": 10,
          "OE.PROCESS_SEC_IC": 2,
          "OE.USE_DIAG": 2,
          "OE.USE_KEYS": 2
        },
        "OSP": {
          "OSP.PROCESS-TOE": 2
        },
        "OT": {
          "OT.ALARM": 2,
          "OT.CIPHER": 2,
          "OT.COMM_AUTH": 2,
          "OT.COMM_CONFIDENTIALITY": 2,
          "OT.COMM_INTEGRITY": 2,
          "OT.DOMAIN-RIGHTS": 2,
          "OT.GLOBAL_ARRAYS_CONFID": 2,
          "OT.GLOBAL_ARRAYS_INTEG": 2,
          "OT.KEY-MNGT": 2,
          "OT.OPERATE": 2,
          "OT.PIN-MNGT": 2,
          "OT.RESOURCES": 2,
          "OT.RND": 2,
          "OT.SCP": 6,
          "OT.TRANSACTION": 2
        },
        "T": {
          "T.COM_EXPLOIT": 2,
          "T.CONFID-APLI-DATA": 1,
          "T.CONFID-APPLI-DATA": 1,
          "T.CONFID-JCS-CODE": 2,
          "T.CONFID-JCS-DATA": 2,
          "T.LIFE_CYCLE": 2,
          "T.MODULE_REPLACEMENT": 2,
          "T.OS_OPERATE": 2,
          "T.PHYSICAL": 2,
          "T.RESOURCES": 2,
          "T.SID": 4,
          "T.UNAUTHORIZED_CARD_MNG": 1,
          "T.UNAUTHORIZED_CARD_MNGT": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012": 2,
          "BSI-CC-PP-0059-2009-MA-02": 2,
          "BSI-CC-PP-0068-V2-2011-MA-01": 2,
          "BSI-CC-PP-0071-2012-MA-01": 2,
          "BSI-CC-PP-0072-2012-MA-01": 2,
          "BSI-CC-PP-0075-2012-MA-01": 2,
          "BSI-CC-PP-0076-2013-MA-01": 2,
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 3,
          "ADV_ARC.1": 1
        },
        "AGD": {
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 3
        },
        "ATE": {
          "ATE_DPT.2": 3
        },
        "AVA": {
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL 4 augmented": 1,
          "EAL 6+": 2,
          "EAL4": 1,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 5
        },
        "FCS": {
          "FCS_CKM": 47,
          "FCS_CKM.1": 11,
          "FCS_CKM.1.1": 8,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 11,
          "FCS_CKM.4.1": 4,
          "FCS_COP": 52,
          "FCS_COP.1": 9,
          "FCS_COP.1.1": 47,
          "FCS_RND.1": 9,
          "FCS_RND.1.1": 1,
          "FCS_RNG": 1,
          "FCS_RNG.1": 5
        },
        "FDP": {
          "FDP_ACC": 13,
          "FDP_ACC.1": 4,
          "FDP_ACF": 16,
          "FDP_ACF.1": 17,
          "FDP_DAU": 5,
          "FDP_DAU.2": 2,
          "FDP_ITC": 4,
          "FDP_ITC.1": 5,
          "FDP_RIP": 2,
          "FDP_RIP.1": 18,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 11,
          "FDP_SDI.2": 12,
          "FDP_UCT": 13,
          "FDP_UCT.1": 1,
          "FDP_UIT": 10,
          "FDP_UIT.1": 7
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL.1": 3,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 1,
          "FIA_API": 2,
          "FIA_API.1": 5,
          "FIA_API.1.1": 2,
          "FIA_UAU": 36,
          "FIA_UAU.1": 9,
          "FIA_UAU.1.1": 8,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 4,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 4,
          "FIA_UAU.6": 2,
          "FIA_UID": 8,
          "FIA_UID.1": 8,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 3,
          "FMT_LIM.1": 6,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 5,
          "FMT_LIM.2.1": 4,
          "FMT_MOF": 1,
          "FMT_MOF.1": 3,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 10,
          "FMT_MSA.1": 2,
          "FMT_MSA.2": 3,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 3,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 3,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 20,
          "FMT_MTD.1": 4,
          "FMT_MTD.1.1": 1,
          "FMT_SMF": 1,
          "FMT_SMF.1": 3,
          "FMT_SMF.1.1": 2,
          "FMT_SMR": 7,
          "FMT_SMR.1": 8,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 2,
          "FPT_EMS.1": 6,
          "FPT_EMS.1.1": 3,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 1,
          "FPT_FLS.1": 7,
          "FPT_FLS.1.1": 2,
          "FPT_ITC": 2,
          "FPT_ITC.1": 2,
          "FPT_PHP": 2,
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 6,
          "FPT_PHP.3.1": 2,
          "FPT_TEE.1": 1,
          "FPT_TST": 2,
          "FPT_TST.1": 9,
          "FPT_TST.1.1": 3,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 2
        },
        "FTP": {
          "FTP_ITC": 35,
          "FTP_ITC.1": 18,
          "FTP_ITC.1.3": 6
        }
      },
      "certification_process": {
        "OutOfScope": {
          "MRTD) functionality is out of scope of this document, it is described in a separate documentation": 1,
          "Protection,  SF.SEManager,  SF.TrustedChannel. The e-passport specific security functionalities (out of scope of this documentation) are:  SF.TerminalAuthentication. The signature specific security": 1,
          "grant access from ADF.MRTD level to ADF.SSCD and vice versa. Developer note MRTD functionality is out of scope of this document, it is described in a separate documentation [ASE MRTD]. 1.3.2 TOE definition The": 1,
          "out of scope": 3,
          "package PWPW pl.pwpw.smartapp.id.sign 1 Machine Readable Travel Document (MRTD) functionality is out of scope of this document, it is described in a separate documentation. PWPW SmartApp-ID 5.0 (SIGN": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 11
        },
        "CCM": {
          "CCM": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 98
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 3,
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 17
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-224": 1,
          "NIST P-256": 1,
          "NIST P-384": 1,
          "NIST P-521": 1,
          "P-224": 1,
          "P-256": 1,
          "P-384": 1,
          "P-521": 1,
          "secp224r1": 1,
          "secp256r1": 1,
          "secp384r1": 1,
          "secp521r1": 1
        }
      },
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 5,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.DG14": 1
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 19
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 8
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 5,
          "malfunction": 1,
          "physical tampering": 7
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "physical probing": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS180-4": 2,
          "FIPS186-4": 7,
          "FIPS197": 2,
          "FIPS46-3": 2
        },
        "ICAO": {
          "ICAO": 4
        },
        "ISO": {
          "ISO/IEC 7816-2": 2
        },
        "PKCS": {
          "PKCS #1": 1,
          "PKCS#1": 5,
          "PKCS#3": 5
        },
        "RFC": {
          "RFC5639": 8
        },
        "SCP": {
          "SCP03": 15
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 50
          }
        },
        "DES": {
          "3DES": {
            "3DES": 7,
            "TDEA": 1,
            "Triple-DES": 19,
            "TripleDES": 7
          },
          "DES": {
            "DES": 17
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 10
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 13,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Krzysztof Janowski",
      "/CreationDate": "D:20241105111047Z00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2013",
      "/ModDate": "D:20241204105037Z00\u002700\u0027",
      "/Producer": "macOS Version 14.6.1 (Build 23G93) Quartz PDFContext, AppendMode 1.1",
      "/Subject": "Security Target Lite",
      "/Title": "PWPW SmartApp-ID 5.0 (SIGN configuration)",
      "pdf_file_size_bytes": 2314840,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 111
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300120-01-CR2.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4+",
      "AVA_VAN.5",
      "ALC_DVS.2",
      "ATE_DPT.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300120-01-STlite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b71efada80e0f651fba7fc52e7d386756534a8eddf60e2a4f397ba8731431ff3",
      "txt_hash": "99ac796413178820982d77577a5e10a54f7713343b686c6ac7464ebcfee9b487"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e5b3be09f7e30bf31ef33b24cb68a89cdd067537d958efc8c9b5a71d2f528567",
      "txt_hash": "0bfd70e99ff38553a86161fbaf1abd622bbd30224526900f07b7acf51bf2a438"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "65308aef8010fba0f4466933cc115d3a49953279196b944a486177ebdf864778",
      "txt_hash": "dd74a714c97abbb6e7745f9cf0eb00fd8e35322482ad991d62f61ca2a69158d0"
    }
  },
  "status": "active"
}