This page was not yet optimized for use on mobile devices.
ELECTRONIC IDENTITY CARD ACCESS DEVICE FIRMWARE PROTECTION PROFILE
CSV information ?
Status: activeCertification date: 2012-09-05 00:00:00
Scheme: 🇹🇷
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+
Frontpage information ?
Protection Profile ID: TSE-CCCS/PP-001Title: Common Criteria Protection Profile for Electronic Identity Card Access Device Firmware (KEC FIRMWARE PP
Version: 1.0
Security level: Minimum assurance level for this PP is EAL 4+ (ALC_DVS.2
Protection profile ?
Extracted keywords
Algorithms
AESProtection profiles
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004Security Assurance Requirements (SAR)
ALC_DVS.2Security Functional Requirements (SFR)
FAU_ARP.1, FAU_GEN.1, FAU_GEN.2, FAU_SAA.1, FAU_SAR.1, FAU_SAR.3, FAU_STG.1, FAU_STG.2, FAU_STG.4, FAU_UAU.1, FCO_NRO.2, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FDP_DAU.1, FDP_ITC.1, FDP_ITC.2, FIA_AFL.1, FIA_UAU.1, FIA_UAU.3, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FIA_UAU.7, FIA_UID.1, FPT_ITC.1, FPT_STM.1, FPT_TDC.1, FTP_ITC.1Standards
FIPS 180-3, FIPS 197, PKCS #1, RFC 5246, RFC 5246, TLS v1.0References ?
No references are available for this protection profile.
Raw data
{
"_id": "5e3185ab22c5061267d1",
"csv_scan": {
"cc_archived_date": null,
"cc_category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cc_certification_date": "2012-09-05 00:00:00",
"cc_pp_name": "ELECTRONIC IDENTITY CARD ACCESS DEVICE FIRMWARE PROTECTION PROFILE",
"cc_pp_version": "V. 1.0",
"cc_security_level": "EAL4+",
"cert_status": "active",
"link_pp_document": "https://www.commoncriteriaportal.org/files/ppfiles/KEC Firmware Protection Profile.pdf",
"link_pp_report": "https://www.commoncriteriaportal.org/files/ppfiles/KEC_F PP CR.pdf",
"maintainance_updates": [],
"scheme": "TR"
},
"frontpage_scan": [
{
"cc_security_level": "Minimum assurance level for this PP is EAL 4+ (ALC_DVS.2",
"cc_version": "3.1 (Revision 3",
"keywords": "Smartcard, Smartcard Reader, Secure Smartcard Reader, Electronic Identity Card, eID, Identity Verification, Electronic Identity Verification System",
"match_rules": [
"Title:(?P\u003cpp_title\u003e.+)?Sponsor: (?P\u003cpp_sponsor\u003e.+)?Editor\\(s\\): (?P\u003cpp_editor\u003e.+)?CC Version: (?P\u003ccc_version\u003e.+)?Assurance Level: (?P\u003ccc_security_level\u003e.+)?General Status: (?P\u003cpp_general_status\u003e.+)?Version Number(?: \\/ Revision Date)?: (?P\u003cpp_version_number\u003e.+)?(?:as of|\\/) (?P\u003cpp_date\u003e.+)?Registration ?: (?P\u003cpp_id\u003e.+)?Key words ?: (?P\u003ckeywords\u003e.+)?Note:"
],
"pp_date": "06th August 2012",
"pp_editor": "Mustafa SELV\u00c4\u00b0 - National Research Institute of Electronics and Cryptology, T\u00c3\u0153B\u00c4\u00b0TAK B\u00c4\u00b0LGEM",
"pp_general_status": "Final",
"pp_id": "TSE-CCCS/PP-001",
"pp_registrator_simplified": "TSE",
"pp_sponsor": "T\u00c3\u0153B\u00c4\u00b0TAK B\u00c4\u00b0LGEM Center of Research For Advanced Technologies of Informatics and Information Security National Research Institute of Electronics and Cryptology",
"pp_title": "Common Criteria Protection Profile for Electronic Identity Card Access Device Firmware (KEC FIRMWARE PP",
"pp_version_number": "1.0"
}
],
"keywords_scan": {
"block_cipher_modes": {},
"rules_IC_data_groups": {},
"rules_cert_id": {},
"rules_certification_process": {},
"rules_cplc": {},
"rules_crypto_algs": {
"AES[-]*(?:128|192|256|)": {
"AES": {
"count": 15
}
}
},
"rules_crypto_engines": {},
"rules_crypto_libs": {},
"rules_defenses": {},
"rules_device_id": {},
"rules_ecc_curves": {},
"rules_javacard": {},
"rules_os": {},
"rules_other": {},
"rules_protection_profiles": {
"CCMB-20[0-9]+?-[0-9]+?-[0-9]+?": {
"CCMB-2009-07-001": {
"count": 2
},
"CCMB-2009-07-002": {
"count": 2
},
"CCMB-2009-07-003": {
"count": 2
},
"CCMB-2009-07-004": {
"count": 2
}
}
},
"rules_security_assurance_components": {
"ALC_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"ALC_DVS.2": {
"count": 4
}
}
},
"rules_security_functional_components": {
"FAU_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FAU_ARP.1": {
"count": 6
},
"FAU_GEN.1": {
"count": 10
},
"FAU_GEN.2": {
"count": 6
},
"FAU_SAA.1": {
"count": 8
},
"FAU_SAR.1": {
"count": 7
},
"FAU_SAR.3": {
"count": 6
},
"FAU_STG.1": {
"count": 2
},
"FAU_STG.2": {
"count": 8
},
"FAU_STG.4": {
"count": 6
},
"FAU_UAU.1": {
"count": 1
}
},
"FCO_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FCO_NRO.2": {
"count": 6
}
},
"FCS_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FCS_CKM.1": {
"count": 4
},
"FCS_CKM.2": {
"count": 1
},
"FCS_CKM.4": {
"count": 7
},
"FCS_COP.1": {
"count": 4
}
},
"FDP_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FDP_DAU.1": {
"count": 6
},
"FDP_ITC.1": {
"count": 1
},
"FDP_ITC.2": {
"count": 1
}
},
"FIA_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FIA_AFL.1": {
"count": 6
},
"FIA_UAU.1": {
"count": 7
},
"FIA_UAU.3": {
"count": 12
},
"FIA_UAU.4": {
"count": 12
},
"FIA_UAU.5": {
"count": 6
},
"FIA_UAU.6": {
"count": 10
},
"FIA_UAU.7": {
"count": 7
},
"FIA_UID.1": {
"count": 9
}
},
"FPT_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FPT_ITC.1": {
"count": 7
},
"FPT_STM.1": {
"count": 7
},
"FPT_TDC.1": {
"count": 6
}
},
"FTP_[A-Z][A-Z][A-Z](?:\\.[0-9]|)": {
"FTP_ITC.1": {
"count": 9
}
}
},
"rules_security_level": {
"EAL[ ]*[0-9+]+?": {
"EAL 4+": {
"count": 1
},
"EAL4": {
"count": 7
}
},
"EAL[ ]*[0-9] augmented+?": {
"EAL4 augmented": {
"count": 2
}
}
},
"rules_standard_id": {
"FIPS ?(?:PUB )?[0-9]+-[0-9]+?": {
"FIPS 180-3": {
"count": 1
}
},
"FIPS ?(?:PUB )?[0-9]+?": {
"FIPS 197": {
"count": 4
}
},
"PKCS[ #]*[1-9]+": {
"PKCS #1": {
"count": 5
}
},
"RFC [0-9]+": {
"RFC 5246": {
"count": 2
}
},
"RFC[ ]*[0-9]+?": {
"RFC 5246": {
"count": 2
}
},
"TLS[ ]*v[0-9\\.]+": {
"TLS v1.0": {
"count": 2
}
}
},
"rules_technical_reports": {},
"rules_vendor": {},
"rules_vulnerabilities": {}
},
"pp_analysis": {
"separate_profiles": []
},
"processed": {
"cc_pp_csvid": [],
"cert_id": ""
}
}