This page was not yet optimized for use on mobile
devices.
ePassport Protection Profile V2.1, Version 2.1
Web information
| Status | active |
|---|---|
| Valid from | 06.05.2010 |
| Scheme | 🇰🇷 KR |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4+, AVA_VAN.4, ADV_IMP.2 |
Certification report
Extracted keywords
Security Assurance Requirements (SAR)
ADV_TDS.3, ADV_FSP.4, ALC_DEL.1, ALC_DVS.1, ALC_TAT.1, ATE_DPT.2, AVA_VAN.4Security Functional Requirements (SFR)
FDP_UCT.1, FDP_UIT.1, FPT_TST.1File metadata
| Title | Microsoft Word - MR_ePassport_PP_V2.0_EN_.docx |
|---|---|
| Author | ITSCC |
| Creation date | D:20110223205500Z00'00' |
| Modification date | D:20110223205500Z00'00' |
| Pages | 2 |
| Creator | PScript5.dll Version 5.2 |
| Producer | Mac OS X 10.6.6 Quartz PDFContext |
Protection Profile
Extracted keywords
Symmetric Algorithms
DES, TDESAsymmetric Algorithms
RSAPSS, ECDH, ECDSA, DH, Diffie-HellmanSchemes
MACBlock cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG16, EF.DG3, EF.DG4, EF.DG14, EF.DG15, EF.COM, EF.SODTrusted Execution Environments
SSCSecurity level
EAL4+, EAL4, EAL4 augmentedClaims
O.BAC, O.EAC, T.EAC-CA, OE.PKISecurity Assurance Requirements (SAR)
ADV_IMP.2, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_FSP.1, ADV_TDS.1, ADV_IMP.1, ADV_FSP.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_CMC.5, ALC_CMS.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.4, AVA_VLA.4, AVA_VLA.3, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_UCT.1, FDP_UIT.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FIA_AFL.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.5, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.3, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.3.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_CKM.4, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_ITI.1, FPT_TST.1, FPT_FLS.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITC.1, FPT_TRP.1, FTP_ITC.1, FTP_TRP.1Evaluation facilities
KISASide-channel analysis
DPA, SPA, malfunction, Malfunction, reverse engineering, Reverse EngineeringStandards
PKCS#3, PKCS#1, ISO/IEC 14443-4, ISO/IEC 11770-2, ISO/IEC 15946-3, ISO/IEC 18033-3, ISO/IEC 10116, ISO/IEC 9797-1, ISO/IEC 14443, ISO/IEC 10116:2006, ICAOFile metadata
| Title | Microsoft Word - ePassport_PP_V2.1_eng_.docx |
|---|---|
| Author | ITSCC |
| Creation date | D:20110221140742 |
| Modification date | D:20110221140742 |
| Pages | 151 |
| Creator | PScript5.dll Version 5.2 |
| Producer | GPL Ghostscript 8.15 |
References
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.- KCOS e-Passport Version 2.1 S3CT9KW/KC/K9 archived
- KCOS e-Passport Version 3.0 S3FT9KF/KT/KS archived
- SK e-Pass V1.0 archived
- SPass NX V1.0 R3 on S3CT9KW/S3CT9KC/S3CT9K9 archived
- SPass NX V1.0 on S3CT9KW/S3CT9KC/S3CT9K9 archived
- SSCOS V1.0 on S3CC9LC archived
- Samsung SDS SPass V2.0 archived
- XSmart e-Passport V1.1 archived
- XSmart e-Passport V1.2 archived
- XSmart e-Passport V1.3 R2 on S3CT9KW/S3CT9KC/S3CT9K9 archived
- XSmart e-Passport V1.3 R3 on S3CT9KW/S3CT9KC/S3CT9K9 archived
- XSmart e-Passport V1.3 on S3CT9KW/S3CT9KC/S3CT9K9 archived
Updates Feed
-
The protection profile data changed.
-
The protection profile data changed.
-
The protection profile was first processed.
Raw data
{
"_id": "4bfe1a1aff1207a4",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "4bfe1a1aff1207a4",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "20110221143918.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"DH": 8,
"Diffie-Hellman": 2
}
},
"RSA": {
"RSAPSS": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.BAC": 15,
"O.EAC": 13
},
"OE": {
"OE.PKI": 3
},
"T": {
"T.EAC-CA": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 15,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 14,
"ADV_IMP.1": 5,
"ADV_IMP.2": 19,
"ADV_TDS.1": 2,
"ADV_TDS.3": 20
},
"AGD": {
"AGD_OPE.1": 14,
"AGD_PRE.1": 9
},
"ALC": {
"ALC_CMC.4": 16,
"ALC_CMC.5": 3,
"ALC_CMS.1": 1,
"ALC_CMS.4": 7,
"ALC_DEL.1": 6,
"ALC_DVS.1": 7,
"ALC_LCD.1": 8,
"ALC_TAT.1": 10
},
"ASE": {
"ASE_CCL.1": 15,
"ASE_ECD.1": 13,
"ASE_INT.1": 15,
"ASE_OBJ.2": 12,
"ASE_REQ.1": 2,
"ASE_REQ.2": 14,
"ASE_SPD.1": 9,
"ASE_TSS.1": 6
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 6,
"ATE_DPT.1": 4,
"ATE_DPT.2": 15,
"ATE_FUN.1": 13,
"ATE_IND.2": 8
},
"AVA": {
"AVA_VAN.4": 14,
"AVA_VLA.3": 1,
"AVA_VLA.4": 3
}
},
"cc_security_level": {
"EAL": {
"EAL4": 13,
"EAL4 augmented": 1,
"EAL4+": 5
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 23,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 12,
"FCS_CKM.2.1": 2,
"FCS_CKM.4": 19,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 29,
"FCS_COP.1.1": 4
},
"FDP": {
"FDP_ACC.1": 15,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 9,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 6,
"FDP_ITC.1": 14,
"FDP_ITC.2": 14,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1,
"FDP_UCT.1": 8,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 8,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU.1": 21,
"FIA_UAU.1.1": 2,
"FIA_UAU.1.2": 2,
"FIA_UAU.4": 6,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 6,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID.1": 14,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_CKM.4": 2,
"FMT_MOF.1": 6,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 9,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 8,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 14,
"FMT_MTD.1.1": 2,
"FMT_MTD.3": 6,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 15,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 13,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 6,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_ITC.1": 1,
"FPT_ITI.1": 8,
"FPT_ITI.1.1": 1,
"FPT_ITI.1.2": 1,
"FPT_TRP.1": 1,
"FPT_TST.1": 7,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC.1": 5,
"FTP_TRP.1": 4
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 44
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"KISA": {
"KISA": 2
}
},
"hash_function": {},
"ic_data_group": {
"EF": {
"EF.COM": 6,
"EF.DG1": 2,
"EF.DG14": 1,
"EF.DG15": 1,
"EF.DG16": 2,
"EF.DG2": 2,
"EF.DG3": 2,
"EF.DG4": 2,
"EF.SOD": 3
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 4,
"malfunction": 8
},
"SCA": {
"DPA": 3,
"SPA": 3
},
"other": {
"Reverse Engineering": 1,
"reverse engineering": 2
}
},
"standard_id": {
"ICAO": {
"ICAO": 24
},
"ISO": {
"ISO/IEC 10116": 2,
"ISO/IEC 10116:2006": 1,
"ISO/IEC 11770-2": 1,
"ISO/IEC 14443": 2,
"ISO/IEC 14443-4": 1,
"ISO/IEC 15946-3": 1,
"ISO/IEC 18033-3": 1,
"ISO/IEC 9797-1": 1
},
"PKCS": {
"PKCS#1": 1,
"PKCS#3": 3
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 5
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 9
}
},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "ITSCC",
"/CreationDate": "D:20110221140742",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20110221140742",
"/Producer": "GPL Ghostscript 8.15",
"/Title": "Microsoft Word - ePassport_PP_V2.1_eng_.docx",
"pdf_file_size_bytes": 761961,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 151
},
"report_filename": "20110221144244.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.4": 1,
"ADV_TDS.3": 1
},
"ALC": {
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_DPT.2": 1
},
"AVA": {
"AVA_VAN.4": 1
}
},
"cc_security_level": {},
"cc_sfr": {
"FDP": {
"FDP_UCT.1": 1,
"FDP_UIT.1": 1
},
"FPT": {
"FPT_TST.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ITSCC",
"/CreationDate": "D:20110223205500Z00\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20110223205500Z00\u002700\u0027",
"/Producer": "Mac OS X 10.6.6 Quartz PDFContext",
"/Title": "Microsoft Word - MR_ePassport_PP_V2.0_EN_.docx",
"pdf_file_size_bytes": 102362,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "460559800fe19d8bb24fcbbab3c2c370dbb77d5a2a7bfcd674328a61d89eb4e7",
"txt_hash": "3ccb0e770e588fe14e83348bde6cf6c3dd2fab3668a41b02e32f4a9c977ed07c"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "31429d80fe97a73f8b24df9bdeb0d9ac270762cf9650d99eb1e783e6f750f4c9",
"txt_hash": "2a820d39c06e53642649377db3171d7647790e4a1901fcd7f6ef6a01a6cd2890"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [],
"name": "ePassport Protection Profile V2.1, Version 2.1",
"not_valid_after": null,
"not_valid_before": "2010-05-06",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/20110221143918.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/20110221144244.pdf",
"scheme": "KR",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.4",
"EAL4+",
"ADV_IMP.2"
]
},
"status": "active",
"version": "2.1"
}
}