AKD eID 2.0 SSCD

CSV information ?

Status active
Valid from 30.09.2024
Valid until 30.09.2029
Scheme 🇳🇱 NL
Manufacturer AKD d.o.o.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, AVA_VAN.5, ALC_DVS.2
Protection profiles

Heuristics summary ?

Certificate ID: NSCIB-CC-2300144-01-CR

Certificate ?

Extracted keywords

Security level
EAL4, EAL2, EAL7, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.3, ALC_FLR, AVA_VAN.5
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-
Certificates
NSCIB-CC-2300144-01, NSCIB-2300144-01
Evaluation facilities
Riscure

Standards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008

File metadata

Title NSCIB Certificate
Author Haak
Creation date D:20241013115200+01'00'
Modification date D:20241013115200+01'00'
Pages 1
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Certification report ?

Extracted keywords

Operating System name
JCOP 4
Vendor
NXP

Security level
EAL4, EAL4+, EAL 4, EAL6+, EAL4 augmented, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP- 0076-
Certificates
NSCIB-CC-2300144-01-CR, NSCIB-2300144-01, NSCIB-CC-2300127-01
Evaluation facilities
Riscure

Side-channel analysis
side-channel, Fault Injection, JIL, JIL-AAPS, JHAS

File metadata

Title Certification Report
Author Haak
Creation date D:20241013123137+01'00'
Modification date D:20241013123137+01'00'
Pages 12
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Frontpage

Certificate ID NSCIB-CC-2300144-01-CR
Certified item AKD eID 2.0 SSCD
Certification lab Riscure B.V.
Developer AKD d.o.o

References

Outgoing

Security target ?

Extracted keywords

Symmetric Algorithms
AES, CMAC
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-256, SHA-384, SHA256, SHA384
Schemes
MAC, Key Agreement
Protocols
SSL, PACE, PGP
Elliptic Curves
P-256, P-384, NIST P-256, NIST P-384
Block cipher modes
CBC

Operating System name
JCOP 4
Vendor
NXP

Security level
EAL4, EAL 4+, EAL4 augmented
Claims
A.CSP, A.CGA, A.SCA, OE.HID_VAD
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP, FDP_DAU, FDP_UIT, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_ACF, FDP_ITC, FDP_IFC.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FDP_UIT.1, FDP_DAU.1, FDP_DAU.2, FDP_UCT, FDP_UCT.1, FIA_API, FIA_API.1, FIA_UAU.1, FIA_API.1.1, FIA_UID.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA.3, FMT_MOF.1, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_TRP.1, FTP_ICT
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-2013-MA-01, BSI-CC-PP-0076-, BSI-PP-0035-2007, PP-SSCD-6
Certificates
BSI-DSZ-CC-1149-V3-2023, NSCIB-CC-2300127-01-CR

Side-channel analysis
physical probing, SPA, DPA, timing attacks, physical tampering, DFA, fault injection
Certification process
out of scope, antenna, card body or carrier are irrelevant for the secure operation of the TOE and are therefore out of scope of the TOE. To be powered and able to communicate, the TOE requires a reader and the terminal

Standards
FIPS 186-4, FIPS 197, NIST SP 800-38B, PKCS#15, RFC 5639, ISO/IEC 7816-3, ISO/IEC 14443, ISO/IEC 14888-3, ISO/IEC 11770-3, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title Security Target Lite AKD eID 2.0 SSCD v2.3
Keywords Common Criteria Security Target Secure Signature Creation Device SSCD Qualified Electronic Signature/Seal Creation Device QSCD
Author Vesna Brigić Mikuc
Creation date D:20240920222037+02'00'
Modification date D:20240920222037+02'00'
Pages 64
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

References

Outgoing

Heuristics ?

Certificate ID: NSCIB-CC-2300144-01-CR

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ALC_CMC.4, ALC_DVS.2, ATE_DPT.1, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ASE_TSS.1, ADV_TDS.3, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ALC_CMS.4, ADV_IMP.1, ALC_TAT.1, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ADV_FSP.4, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2

Scheme data ?

Cert Id NSCIB-CC-2300144-01-CR
Certification Date 30.09.2024
Status Issued
Product AKD eID 2.0 SSCD
Developer AKD d.o.o.
Evaluation Facility Riscure
Level EAL4+ AVA_VAN.5, ALC_DVS.2
Cert Link https://trustcb.com/download/?wpdmdl=4509
Report Link https://trustcb.com/download/?wpdmdl=4510
Target Link https://trustcb.com/download/?wpdmdl=4511

References ?

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'cert_id': 'NSCIB-CC-2300144-01-CR', 'certification_date': '2024-09-30', 'status': 'Issued', 'product': 'AKD eID 2.0 SSCD', 'developer': 'AKD d.o.o.', 'evaluation_facility': 'Riscure', 'level': 'EAL4+ AVA_VAN.5, ALC_DVS.2', 'cert_link': 'https://trustcb.com/download/?wpdmdl=4509', 'report_link': 'https://trustcb.com/download/?wpdmdl=4510', 'target_link': 'https://trustcb.com/download/?wpdmdl=4511'}.
  • 30.10.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name AKD eID 2.0 SSCD was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300144-01-Cert.pdf",
  "dgst": "5a7ffad9f27b5ca5",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-2300144-01-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300127-01-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-2022",
          "BSI-DSZ-CC-1149-V3-2023",
          "BSI-DSZ-CC-1149-V2-2023",
          "NSCIB-CC-2300127-01-CR"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "NSCIB-CC-2300144-01-CR",
      "cert_link": "https://trustcb.com/download/?wpdmdl=4509",
      "certification_date": "2024-09-30",
      "developer": "AKD d.o.o.",
      "evaluation_facility": "Riscure",
      "level": "EAL4+ AVA_VAN.5, ALC_DVS.2",
      "product": "AKD eID 2.0 SSCD",
      "report_link": "https://trustcb.com/download/?wpdmdl=4510",
      "status": "Issued",
      "target_link": "https://trustcb.com/download/?wpdmdl=4511"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-V3-2023",
          "NSCIB-CC-2300127-01-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-V3-2023",
          "NSCIB-CC-2300127-01-CR"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "AKD d.o.o.",
  "manufacturer_web": "https://www.akd.hr",
  "name": "AKD eID 2.0 SSCD",
  "not_valid_after": "2029-09-30",
  "not_valid_before": "2024-09-30",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "NSCIB-CC-2300144-01-Cert.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "NSCIB-2300144-01": 1,
          "NSCIB-CC-2300144-01": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-02": 1,
          "BSI-CC-PP-0071-2012-MA-01": 1,
          "BSI-CC-PP-0072-2012-MA-01": 1,
          "BSI-CC-PP-0075-2012-MA-01": 1,
          "BSI-CC-PP-0076-": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.3": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Riscure": {
          "Riscure": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 18045:2008": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Haak",
      "/CreationDate": "D:20241013115200+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20241013115200+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "NSCIB Certificate",
      "pdf_file_size_bytes": 96238,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "NSCIB-CC-2300144-01-CR.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-2300144-01-CR",
        "cert_item": "AKD eID 2.0 SSCD",
        "cert_lab": " Riscure B.V.",
        "developer": "AKD d.o.o"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "NSCIB-2300144-01": 1,
          "NSCIB-CC-2300127-01": 1,
          "NSCIB-CC-2300144-01-CR": 12
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0076-": 1,
          "BSI-CC-PP-0071-2012-MA-01": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 2
        },
        "AVA": {
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 2,
          "EAL4 augmented": 1,
          "EAL4+": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Riscure": {
          "Riscure": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 5
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Fault Injection": 1
        },
        "SCA": {
          "side-channel": 1
        },
        "other": {
          "JHAS": 1,
          "JIL": 3,
          "JIL-AAPS": 1
        }
      },
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Haak",
      "/CreationDate": "D:20241013123137+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20241013123137+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 309031,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "https://nscib.nl/",
          "https://www.sogis.eu/",
          "https://trustcb.com/common-criteria/nscib/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 12
    },
    "st_filename": "NSCIB-CC-2300144-01-ST_Lite_v2.4.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 11
          },
          "ECDSA": {
            "ECDSA": 5
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 8
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1149-V3-2023": 2
        },
        "NL": {
          "NSCIB-CC-2300127-01-CR": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.CGA": 3,
          "A.CSP": 4,
          "A.SCA": 3
        },
        "OE": {
          "OE.HID_VAD": 10
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-02": 3,
          "BSI-CC-PP-0071-2012-MA-01": 2,
          "BSI-CC-PP-0072-2012-MA-01": 2,
          "BSI-CC-PP-0075-2012-MA-01": 3,
          "BSI-CC-PP-0076-": 1,
          "BSI-CC-PP-0076-2013-MA-01": 2,
          "BSI-PP-0035-2007": 1
        },
        "other": {
          "PP-SSCD-6": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 4,
          "ADV_FSP.4": 3,
          "ADV_IMP.1": 3,
          "ADV_TDS.3": 3
        },
        "AGD": {
          "AGD_OPE.1": 3,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 9,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 8
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4+": 2,
          "EAL4": 13,
          "EAL4 augmented": 5
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1
        },
        "FCS": {
          "FCS_CKM.1": 19,
          "FCS_CKM.1.1": 4,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 17,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 58,
          "FCS_COP.1": 9
        },
        "FDP": {
          "FDP_ACC": 40,
          "FDP_ACC.1": 27,
          "FDP_ACF": 27,
          "FDP_ACF.1": 25,
          "FDP_DAU": 8,
          "FDP_DAU.1": 1,
          "FDP_DAU.2": 2,
          "FDP_IFC.1": 14,
          "FDP_ITC": 8,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 9,
          "FDP_RIP.1": 6,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 17,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 4,
          "FDP_UCT": 9,
          "FDP_UCT.1": 1,
          "FDP_UIT": 7,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 6,
          "FIA_API.1": 11,
          "FIA_API.1.1": 2,
          "FIA_UAU.1": 14,
          "FIA_UAU.1.1": 3,
          "FIA_UAU.1.2": 1,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 13,
          "FMT_MSA.1": 7,
          "FMT_MSA.2": 7,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 22,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 8,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 14,
          "FMT_MTD.1": 2,
          "FMT_SMF.1": 23,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 24,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_EMS": 8,
          "FPT_EMS.1": 11,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS.1": 7,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 7,
          "FPT_PHP.3.1": 1,
          "FPT_TST": 1,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ICT": 2,
          "FTP_ITC": 28,
          "FTP_ITC.1": 17,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "antenna, card body or carrier are irrelevant for the secure operation of the TOE and are therefore out of scope of the TOE. To be powered and able to communicate, the TOE requires a reader and the terminal": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 7
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 15
        },
        "PGP": {
          "PGP": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-256": 1,
          "NIST P-384": 1,
          "P-256": 1,
          "P-384": 1
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA256": 1,
            "SHA384": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 9
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "fault injection": 1,
          "physical tampering": 5
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "physical probing": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS 186-4": 3,
          "FIPS 197": 5
        },
        "ICAO": {
          "ICAO": 2
        },
        "ISO": {
          "ISO/IEC 11770-3": 3,
          "ISO/IEC 14443": 2,
          "ISO/IEC 14888-3": 3,
          "ISO/IEC 7816-3": 1
        },
        "NIST": {
          "NIST SP 800-38B": 2
        },
        "PKCS": {
          "PKCS#15": 2
        },
        "RFC": {
          "RFC 5639": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 21
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 8
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 9
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Vesna Brigi\u0107 Mikuc",
      "/CreationDate": "D:20240920222037+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "Common Criteria Security Target Secure Signature Creation Device SSCD Qualified Electronic Signature/Seal Creation Device QSCD",
      "/ModDate": "D:20240920222037+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Title": "Security Target Lite AKD eID 2.0 SSCD v2.3",
      "pdf_file_size_bytes": 1278868,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 64
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device - Part 6: Extension for device with key impo..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 4: Extension for device with key gene..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device \u2014 Part 5: Extension for device with key gene..."
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PP_SSCD_PART3_V1.0.2"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf",
        "pp_name": "Protection profiles for secure signature creation device - Part 3: Device with key import"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
        "pp_name": "Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300144-01-CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "AVA_VAN.5",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300144-01-ST_Lite_v2.4.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e14bffe0dd4e3907ef9f78daa70a4368bb09cb24771fc34bb657629fae2c059b",
      "txt_hash": "c4510193bc9d9b8364719537e995dd9d129410b862fd3009642626919ba66c2a"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4f3446decf7943f8c60a43cf1f2a02839e596616515282cb22c11dde39be9f0d",
      "txt_hash": "39f78f239ce718d6629ded5da4405c3636cd87e2e2aa39b47b1ad39cda6350b8"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "42e9fadda075a5e017cf87b3b552817471795ced290b2a99b0862abe2edcde68",
      "txt_hash": "b1677568ceb8ff3304b53d074716e0b946fb9e1fae9a47edd8480392c19ec543"
    }
  },
  "status": "active"
}