This page was not yet optimized for use on mobile devices.
Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)
Web information ?
Status: activeCertification date: 2011-11-10
Scheme: đ©đȘ
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: ATE_DPT.2, AVA_VAN.5, EAL4+
Certification report ?
Extracted keywords
Protocols
PACESecurity level
EAL 4, EAL1, EAL4, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 4 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_DPT.2, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2, APE_OBJ.1, APE_REQ.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0068-2010Evaluation facilities
SRC Security Research & ConsultingCertification process
Document using Standard Inspection Procedure with PACE, SRC Security Research & Consulting GmbH (confidential document) [6] Protection Profile BSI-CC-PP-0068-V2-2011, Machine Readable Travel Document using StandardStandards
AIS 32, AIS 38, ICAOTechnical reports
BSI TR-03110, BSI 7125, BSI 2, BSI 7148, BSI 7149File metadata
Title | Certification Report BSI-CC-PP-0068-V2-2011 |
---|---|
Subject | PACE_PP |
Keywords | "Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil, PACE, SAC, PACE_PP" |
Author | Bundesamt fĂŒr Sicherheit in der Informationstechnik |
Creation date | D:20111205084515+01'00' |
Modification date | D:20111205084937+01'00' |
Pages | 28 |
Creator | Writer |
Producer | OpenOffice.org 3.2 |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, Triple-DES, KMAC, CMACAsymmetric Algorithms
ECDH, Diffie-Hellman, DHSchemes
MAC, Key AgreementProtocols
PACEBlock cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG16, EF.DG5, EF.DG3, EF.DG4, EF.COM, EF.SODSecurity level
EAL4, EAL4 augmentedSecurity Assurance Requirements (SAR)
ACE_MAC, ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.2, ATE_FUN.1, ATE_DPT.1, AVA_VAN.5, ASE_ECDSecurity Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_COP, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FDP_ACF, FDP_RIP, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_RIP.1.1, FDP_UCT.1, FDP_UCT, FDP_IFC.1, FDP_UIT.1, FDP_UIT, FIA_SOS.2, FIA_UAU, FIA_UID, FIA_AFL, FIA_UAU.1, FIA_AFL.1, FIA_UID.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR, FMT_MTD, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_MTD.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0055-2009, BSI-PP-0035-2007, BSI-CC-PP-0056-2009Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, Physical tampering, physical tampering, Malfunction, malfunction, fault injection, reverse engineeringCertification process
out of scope, to the plastic travel document is achieved by physical and organisational security measures being out of scope of the current PP. The TOE shall comprise at least i) the circuitry of the contactless/contact chipStandards
PKCS#3, RFC 3369, ISO/IEC 7816-2, ISO/IEC 14443, ISO/IEC 7816-4, ICAO, CCMB-2007-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004, CCMB-2006-09-001File metadata
Title | Common Criteria Protection Profile BSI-CC-PP-0068-V2-2011 |
---|---|
Subject | PACE PP |
Keywords | PACE PP, BSI-CC-PP-0068-V2-2011 |
Author | Bundesamt fĂŒr Sicherheit in der Informationstechnik |
Creation date | D:20111206140932+01'00' |
Modification date | D:20111206151514+01'00' |
Pages | 72 |
Creator | Writer |
Producer | OpenOffice.org 3.2 |
References ?
- SOMA-c004 e-Passport (EAC-SAC-AA), v1.0 archived
- ChipDoc P60 on JCOP 3 SECID P60 (OSA) ICAO EAC avec AA, CA et PACE masqué sur composant P6022J VB archived
- Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 â PACE, EAC (version 1.0) active
- Application eTravel EAC v2.0, en configurationSAC, sur la carte à puce fermée MultiApp V3masquée sur le composant M7820 A11(Version du patch : 5.0) archived
- ePass Applet on JCOP 4 C1 active
- ePass Applet on Sm@rtCaféŸ Expert 8.0 C2 v1.0 active
- NXP eDoc Suite v4.0 on JCOP4.5 P71 - cryptovision ePasslet Suite - Java Card applet configuration providing Machine Readable Travel Document with "ICAO Applicationâ, Extended Access Control with PACE active
- ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) active
- ID-One ePass Full EAC v2 en configuration PACE masqué sur les composants P60x080PVC/PVG archived
- IDentity Card v3.2/PACE-EAC1 archived
- Application eTravel EAC v2.1, en configurationEAC et SAC, sur la plateforme ouverteMultiApp V3.1 masquée sur le composantP60D080PVC(Version du patch : 1.4) archived
- eTravel 2.5 EAC on SAC on MultiApp V5.0 (2.5.0.0) active
- Digital Identity 1.0.A PACE, EAC on MultiApp V5.0.A(version 1.0.A) active
- ID-One ePass Full EAC v2 en configuration EAC et PACE masqué sur les composants P60x080PVC/PVG archived
- CELES-c001 Machine Readable Electronic Document ICAO Application - EAC-PACE-AA, version 1 (CELES-c001_1) active
- Digital Identity 1.0.A PACE, EAC on MultiApp V5.0.A (version 1.0.A) active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE Configuration) SAAAAR : 203742 active
- HID Global S.p.A. SOMA-c016 Machine Readable Electronic Document ICAO Application - EAC-PACE-AA, version 4 active
- ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration (Version 2.0 eMRTD (B)) active
- KCOS e-Passport Version 5.0 - SAC, EAC and AA on S3D350A Family archived
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE Configuration) SAAAAR : 203742 archived
- eTravel Essential 1.1, PACE, EAC and AA activated archived
- ACOS-IDv2.1 SSCD (A) CL-TC-Comm (Version 2.1 SSCD (A)) active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE Configuration) SAAAAR : 203742 (ANSSI-CC-2023/49) active
- eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) active
- Infineon Mercury ePassport v1.16 archived
- IDentity Applet v3.4/PACE-EAC1 on NXP JCOP 4 P71 active
- ID-One ePass Full EAC v2 MRTD en configuration EAC et PACE avec AA masqué sur les composants P60x144PVA/PVE archived
- SECORAâą ID X Applet Collection with ePasslet Suite v3.5 by cryptovision GmbH, version 1.0 â Java Card applet configuration providing Machine Readable Travel Document with âICAO Applicationâ, Extended Access Control with PACE active
- HID Global S.p.A. HIDApp-eDoc suite ICAO Application - EAC-PACE-AA Version 3_00 active
- IDEMIA TnD v5.1 on ID-One Cosmo X (PACE/EAC1/Polymorphic eMRTD/LDS2 configuration) active
- XSmart e-Passport V1.5 EAC with PACE on M7892 active
- IDentity Applet v3.4-p1/PACE-EAC1 on NXP JCOP 4 P71 active
- CardOS V6.0 ID R1.1 active
- DNIe version 4.0 active
- IDeal Pass v2.3-n JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration) archived
- eTravel 2.5.A EAC on SAC on MultiApp V5.0.A (version 2.5.A.0.0) active
- KONA2 D2320N ePassport [EAC with PACE configuration] version 02 revision 10 update 00 archived
- IDEMIA TnD v5.1 on ID-One Cosmo X (PACE/EAC1/Polymorphic eMRTD/LDS2 configuration) active
- Veridos Suite v3.0 â cryptovision ePasslet Suite â Java Card applet configuration providing Machine Readable Travel Document with âICAO Applicationâ, Extended Access Control with PACE archived
- ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) active
- CardOS V6.0 ID R1.0 active
- LDS Applet PACE with CAM, CA and AA on ID-One V8.2 Platform on NXP P60D145 (version 03 00 00 00) archived
- ChipDoc v2 on JCOP 3 P60 in ICAO EAC with PACE configuration active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration) SAAAAR : 203742 active
- LDS Applet PACE with CAM, CA and AA on ID-One Cosmo V8.2 on NXP P60D145 (version 03 00 00 00) active
- eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 active
- ID-One ePass Full EAC v2 MRTD en configuration EAC et PACE avec AA masqué sur les composants P60x080PVC/PVG archived
- MaskTech ePP Applet on Secora ID S v1.1 active
- IDmove v4 on Infineon in EAC with PACE configuration with AA in option archived
- Veridos ePass Applet on Sm@rtCafé Expert 8.0 C1, Version 1.0 active
- PWPW SmartApp-ID 3.1 (IFX) archived
- eTravel Essential 1.0, avec SAC, AA et EAC activés sur composant M7794 A12/G12 archived
- TnD v5.1 on ID-One Cosmo X (PACE/EAC1/Polymorphic eMRTD/LDS2 configuration) archived
- ID-One ePass Full EAC v2 MRTD en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x144PVA/PVE archived
- IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71 active
- TnD v5.1 on Cosmo J in EAC with PACE Configuration active
- ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC (1&2) with PACE configuration, Version 3.1.6.52 archived
- eTravel 2.2 en configuration EAC sur SAC sur Plate-forme MultiApp v4.0 archived
- cv act ePasslet Suite v2.1 â Java Card applet configuration providing Machine Readable Travel Document with âICAO Applicationâ, Extended Access Control with PACE archived
- TnD v5.1 on ID-One Cosmo J V2 (PACE/EAC1/Polymorphic eMRTD/LDS2 configuration) active
- Applet MICAO v1.3.69 sur la plateforme IDealCitiz 2.1.1, en configuration SAC/EAC archived
- eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) active
- Applet MICAO v1.1.3 sur la plateforme IdealCitiz v2.1, en configuration SAC/EAC archived
- ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC (1&2) with PACE configuration (v2) active
- ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC with PACE configuration active
- Permiso de Residencia versiĂłn 4.0 active
- IDmove v5 on SCR404U in PACE configuration with AA and/or CA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108 (ANSSI-CC-2023/66) active
- eTravel Essential 1.3-2.0 â PACE, EAC and AA activated (Version 1.0) active
- Ideal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration) archived
- ID-One ePass Full EAC v2 MRTD en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x080PVC/PVG archived
- ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC with PACE configuration (Version 4.0.1.52) active
- PWPW SmartApp-MRTD 1.0 active
- IDmove v4 on Infineon in PACE configuration with AA and/or CA in option OS Commercial Version : 0x 09 08 06 ; OS Unique Identifier : 0x DC 71 (ANSSI-CC-2019/58-R01) active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration) SAAAAR : 203742 archived
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration(SAAAAR : 203742) active
- ASapp-eID-EAC-PACE-AA v1.0 archived
- Pasaporte electrĂłnico versiĂłn 4.0 active
- ID-One ePass IDL Full EACv2 in PACE MRTD configuration on Infineon SLE77CLFX2400P and SLE77CLFX2407P active
- NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite â Java Card applet configuration providing Machine Readable Travel Document with âICAO Applicationâ, Extended Access Control with PACE active
- NXP JAVA OS1 ChipDoc v1.0 ICAO EAC-SAC with optional AA on P60D080JVC archived
- eTravel 3.0 EAC on SAC on MultiApp v4.2 (version 3.0.0) active
- IDentity Applet v3.4-p2/eIDAS on NXP JCOP 4 P71 active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID Configuration) SAAAAR : 203742 (ANSSI-CC-2023/50) active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE Configuration) SAAAAR : 203742 active
- Veridos Suite v4.0 - cryptovision ePasslet Suite - Java Card applet configuration providing Machine-Readable Electronic Documents âICAO Applicationâ, Extended Access Control with PACE active
- ChipDoc v3 on JCOP 4 P71 in ICAO EAC with PACE configuration active
- IDEMIA TnD v5.1 on ID-One Cosmo X (PACE/EAC1/Polymorphic eMRTD/LDS2 configuration) active
- Infineon Mercury ePassport v2.20 active
- eTravel SAC/EAC/BAC V2.0 with Filter 5.0 on MultiApp V3 - Configuration SAC référence T1033550 archived
- IDentity Card v3.1/PACE-EAC1 archived
- Infineon Voyager ePassport v2.20 active
- ChipDoc v3 on JCOP 4 P71in ICAO EAC with PACE configuration (Version 3.0.0.52) active
- IDmove v4 on Infineon in EAC with PACE configuration with AA in option OS Commercial Version : 0x 09 08 06 ; OS Unique Identifier : 0x DC 71 (ANSSI-CC-2019/57-R01) active
- eTravel Essential 1.0, configuration"full" avec application PACE archived
- IDmove v4 on Infineon in PACE configuration with AA and/or CA in option archived
- IDeal PASS, version 2.0.1 - Application EAC avec PACE active
- eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02 active
- NXP SmartePP Enhanced/Next-gen on P71 version 03 00 00 10 active
- IDentity Applet v3.4-p2/PACE-EAC1 on NXP JCOP 4 P71 active
- LDS Applet EAC with PACE on ID-One V8.2 Platform on NXP P60D145 (version 03 00 00 00) archived
- ASapp-eID-EAC-PACE-AA (OSB) v1.0 archived
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration) SAAAAR : 203742 active
- eTravel Essential 1.2 â PACE, EAC and AA activated (release â0300â) active
- SOMA-c016 Machine Readable Electronic Document ICAO Application - EAC-PACE-AA, version 3 active
- Idemia CombICAO Applet in PACE and CA configuration on ID-ONE Cosmo V9 Essential archived
- Infineon ePassport configuration of SECORAâą ID S Infineon Applet Collection - eMRTD V1.1 active
- SOMA-c018 Machine Readable Electronic Document-EAC-PACE-AA version 2 (SOMAc018_2) active
- SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4) active
- eTravel Essential 1.2 â PACE, EAC and AA activated(release â0300â) active
- eTravel 2.5.A EAC on SAC on MultiApp V5.0.A(version 2.5.A.0.0) active
- CardOS V6.0 ID R1.2 active
Updates ?
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP) was processed.
Raw data
{
"_id": "b380aabf93b29692",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "b380aabf93b29692",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp0068_V2b_pdf.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 3
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 5
}
}
},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055-2009": 2,
"BSI-CC-PP-0056-2009": 1,
"BSI-CC-PP-0068-V2-2011": 73,
"BSI-PP-0035-2007": 1
}
},
"cc_sar": {
"ACE": {
"ACE_MAC": 1
},
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_DVS.2": 5
},
"ASE": {
"ASE_ECD": 1
},
"ATE": {
"ATE_DPT.1": 1,
"ATE_DPT.2": 5,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL4": 13,
"EAL4 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 7,
"FAU_SAS.1": 9,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 16,
"FCS_CKM.1": 5,
"FCS_CKM.2": 2,
"FCS_CKM.4": 12,
"FCS_CKM.4.1": 1,
"FCS_COP": 14,
"FCS_COP.1": 4,
"FCS_RND": 7,
"FCS_RND.1": 11,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC": 6,
"FDP_ACC.1": 6,
"FDP_ACF": 9,
"FDP_ACF.1": 9,
"FDP_IFC.1": 2,
"FDP_ITC.1": 3,
"FDP_ITC.2": 3,
"FDP_RIP": 2,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_UCT": 4,
"FDP_UCT.1": 2,
"FDP_UIT": 4,
"FDP_UIT.1": 3
},
"FIA": {
"FIA_AFL": 6,
"FIA_AFL.1": 2,
"FIA_SOS.2": 1,
"FIA_UAU": 37,
"FIA_UAU.1": 3,
"FIA_UAU.4": 1,
"FIA_UAU.5": 2,
"FIA_UAU.6": 1,
"FIA_UID": 8,
"FIA_UID.1": 4
},
"FMT": {
"FMT_LIM": 7,
"FMT_LIM.1": 15,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 15,
"FMT_LIM.2.1": 3,
"FMT_MSA.1": 1,
"FMT_MSA.3": 2,
"FMT_MTD": 22,
"FMT_MTD.1": 8,
"FMT_SMF.1": 16,
"FMT_SMF.1.1": 1,
"FMT_SMR": 13,
"FMT_SMR.1": 2
},
"FPT": {
"FPT_EMS": 7,
"FPT_EMS.1": 8,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 7,
"FPT_PHP.3.1": 1,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 2
},
"FTP": {
"FTP_ITC": 11,
"FTP_ITC.1": 6,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"to the plastic travel document is achieved by physical and organisational security measures being out of scope of the current PP. The TOE shall comprise at least i) the circuitry of the contactless/contact chip": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 305
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {
"EF": {
"EF.COM": 1,
"EF.DG1": 5,
"EF.DG16": 3,
"EF.DG2": 3,
"EF.DG3": 1,
"EF.DG4": 1,
"EF.DG5": 1,
"EF.SOD": 3
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"Physical Tampering": 2,
"Physical tampering": 2,
"fault injection": 1,
"malfunction": 6,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 3,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 1,
"CCMB-2007-09-001": 1,
"CCMB-2007-09-002": 2,
"CCMB-2007-09-003": 2,
"CCMB-2007-09-004": 2
},
"ICAO": {
"ICAO": 8
},
"ISO": {
"ISO/IEC 14443": 4,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-4": 1
},
"PKCS": {
"PKCS#3": 3
},
"RFC": {
"RFC 3369": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
}
},
"DES": {
"3DES": {
"3DES": 4,
"Triple-DES": 4
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"KMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20111206140932+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "PACE PP, BSI-CC-PP-0068-V2-2011",
"/ModDate": "D:20111206151514+01\u002700\u0027",
"/Producer": "OpenOffice.org 3.2",
"/Subject": "PACE PP",
"/Title": "Common Criteria Protection Profile BSI-CC-PP-0068-V2-2011",
"pdf_file_size_bytes": 929672,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 72
},
"report_filename": "pp0068_V2a_pdf.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0068-2010": 3,
"BSI-CC-PP-0068-V2-2011": 15
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 2,
"APE_ECD.1": 2,
"APE_INT.1": 2,
"APE_OBJ.1": 1,
"APE_OBJ.2": 2,
"APE_REQ.1": 1,
"APE_REQ.2": 2,
"APE_SPD.1": 2
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 4,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 3,
"EAL 4 augmented": 2,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 7,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Document using Standard Inspection Procedure with PACE, SRC Security Research \u0026 Consulting GmbH (confidential document) [6] Protection Profile BSI-CC-PP-0068-V2-2011, Machine Readable Travel Document using Standard": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 13
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 38": 1
},
"ICAO": {
"ICAO": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 2": 1,
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1,
"BSI TR-03110": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20111205084515+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil, PACE, SAC, PACE_PP\"",
"/ModDate": "D:20111205084937+01\u002700\u0027",
"/Producer": "OpenOffice.org 3.2",
"/Subject": "PACE_PP",
"/Title": "Certification Report BSI-CC-PP-0068-V2-2011",
"pdf_file_size_bytes": 784692,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "61560ad7c7e62c42f80b3dc0a42bc60872dcf923a4117ff5a2aaee110cba4e26",
"txt_hash": "622084d8ee5b2bc1a499ea4a008f2258530e554e6da8463c4a45cc2e89271d0c"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4e6894dda13faf460a9013bd331916783474c3555962f296cf6665bb60b0ba71",
"txt_hash": "6e256e8cc067ef421a8475a1ee02e4afb5dc7c9d1fa1c8cf7ff48e03dc4f5cf1"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [
[
"2014-07-31",
"Common Criteria Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2_ma1a_pdf.pdf"
]
],
"name": "Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)",
"not_valid_after": null,
"not_valid_before": "2011-11-10",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"ATE_DPT.2",
"EAL4+"
]
},
"status": "active",
"version": "Version 1.0"
}
}