This page was not yet optimized for use on mobile devices.
Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)
Web information ?
Status: activeCertification date: 2011-11-10
Scheme: đ©đȘ
Category: ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level: EAL4+, AVA_VAN.5, ATE_DPT.2
Certification report ?
Extracted keywords
Protocols
PACESecurity level
EAL 4, EAL1, EAL4, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 4 augmented, ITSEC EvaluationSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_DPT.2, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.2, APE_ECD.1, APE_REQ.2, APE_OBJ.1, APE_REQ.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0068-2010Evaluation facilities
SRC Security Research & ConsultingCertification process
Document using Standard Inspection Procedure with PACE, SRC Security Research & Consulting GmbH (confidential document) [6] Protection Profile BSI-CC-PP-0068-V2-2011, Machine Readable Travel Document using StandardStandards
AIS 32, AIS 38, ICAOTechnical reports
BSI TR-03110, BSI 7125, BSI 2, BSI 7148, BSI 7149File metadata
Title | Certification Report BSI-CC-PP-0068-V2-2011 |
---|---|
Subject | PACE_PP |
Keywords | "Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil, PACE, SAC, PACE_PP" |
Author | Bundesamt fĂŒr Sicherheit in der Informationstechnik |
Creation date | D:20111205084515+01'00' |
Modification date | D:20111205084937+01'00' |
Pages | 28 |
Creator | Writer |
Producer | OpenOffice.org 3.2 |
Profile ?
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, Triple-DES, KMAC, CMACAsymmetric Algorithms
ECDH, Diffie-Hellman, DHSchemes
MAC, Key AgreementProtocols
PACEBlock cipher modes
CBCIC data groups
EF.DG1, EF.DG2, EF.DG16, EF.DG5, EF.DG3, EF.DG4, EF.COM, EF.SODSecurity level
EAL4, EAL4 augmentedSecurity Assurance Requirements (SAR)
ACE_MAC, ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.2, ATE_FUN.1, ATE_DPT.1, AVA_VAN.5, ASE_ECDSecurity Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_COP, FCS_CKM, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FDP_ACF, FDP_RIP, FDP_ITC.1, FDP_ITC.2, FDP_RIP.1, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_RIP.1.1, FDP_UCT.1, FDP_UCT, FDP_IFC.1, FDP_UIT.1, FDP_UIT, FIA_SOS.2, FIA_UAU, FIA_UID, FIA_AFL, FIA_UAU.1, FIA_AFL.1, FIA_UID.1, FIA_UAU.4, FIA_UAU.5, FIA_UAU.6, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR, FMT_MTD, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_MTD.1, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0068-V2-2011, BSI-CC-PP-0055-2009, BSI-PP-0035-2007, BSI-CC-PP-0056-2009Side-channel analysis
physical probing, DPA, SPA, timing attacks, Physical Tampering, Physical tampering, physical tampering, Malfunction, malfunction, fault injection, reverse engineeringCertification process
out of scope, to the plastic travel document is achieved by physical and organisational security measures being out of scope of the current PP. The TOE shall comprise at least i) the circuitry of the contactless/contact chipStandards
PKCS#3, RFC 3369, ISO/IEC 7816-2, ISO/IEC 14443, ISO/IEC 7816-4, ICAO, CCMB-2007-09-001, CCMB-2007-09-002, CCMB-2007-09-003, CCMB-2007-09-004, CCMB-2006-09-001File metadata
Title | Common Criteria Protection Profile BSI-CC-PP-0068-V2-2011 |
---|---|
Subject | PACE PP |
Keywords | PACE PP, BSI-CC-PP-0068-V2-2011 |
Author | Bundesamt fĂŒr Sicherheit in der Informationstechnik |
Creation date | D:20111206140932+01'00' |
Modification date | D:20111206151514+01'00' |
Pages | 72 |
Creator | Writer |
Producer | OpenOffice.org 3.2 |
References ?
- ACOS-IDv2.0 eMRTD (B) EAC/PACE Configuration (Version 2.0 eMRTD (B)) active
- ACOS-IDv2.1 SSCD (A) CL-TC-Comm (Version 2.1 SSCD (A)) active
- ACOS-IDv4.1 eMRTD (A) EAC/PACE Configuration (version 4.1 eMRTD (A)) (ANSSI-CC-2025/16) active
- ASapp-eID-EAC-PACE-AA (OSB) v1.0 archived
- ASapp-eID-EAC-PACE-AA v1.0 archived
- Applet MICAO v1.1.3 sur la plateforme IdealCitiz v2.1, en configuration SAC/EAC archived
- Applet MICAO v1.3.69 sur la plateforme IDealCitiz 2.1.1, en configuration SAC/EAC archived
- Application eTravel EAC v2.0, en configurationSAC, sur la carte à puce fermée MultiApp V3masquée sur le composant M7820 A11(Version du patch : 5.0) archived
- Application eTravel EAC v2.1, en configurationEAC et SAC, sur la plateforme ouverteMultiApp V3.1 masquée sur le composantP60D080PVC(Version du patch : 1.4) archived
- CELES-c001 Machine Readable Electronic Document ICAO Application - EAC-PACE-AA, version 1 (CELES-c001_1) active
- CardOS V6.0 ID R1.0 active
- CardOS V6.0 ID R1.1 active
- CardOS V6.0 ID R1.2 active
- ChipDoc P60 on JCOP 3 SECID P60 (OSA) ICAO EAC avec AA, CA et PACE masqué sur composant P6022J VB archived
- ChipDoc v2 on JCOP 3 P60 in ICAO EAC with PACE configuration active
- ChipDoc v3 on JCOP 4 P71 in ICAO EAC with PACE configuration active
- ChipDoc v3 on JCOP 4 P71 in ICAO EAC with PACE configuration (Version 3.0.0.52) (ANSSI-CC-2020/72-R01) active
- ChipDoc v3 on JCOP 4 P71in ICAO EAC with PACE configuration (Version 3.0.0.52) archived
- ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC (1&2) with PACE configuration (v2) active
- ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC (1&2) with PACE configuration, Version 3.1.6.52 archived
- ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC with PACE configuration active
- ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.1.6.52) (ANSSI-CC-2021/19-R01) active
- ChipDoc v3.2 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.2.0.52) (ANSSI-CC-2025/02) active
- ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC with PACE configuration (Version 4.0.1.52) active
- ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) active
- ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE Configuration) SAAAAR : 203742 active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE Configuration) SAAAAR : 203742 archived
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE Configuration) SAAAAR : 203742 active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE Configuration) SAAAAR : 203742 (ANSSI-CC-2023/49) active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID Configuration) SAAAAR : 203742 (ANSSI-CC-2023/50) active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration(SAAAAR : 203742) active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration) SAAAAR : 203742 active
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration) SAAAAR : 203742 archived
- CombICAO Applet v3 on ID-One Cosmo X (EAC with PACE for French ID configuration) SAAAAR : 203742 active
- DNIe version 4.0 active
- Digital Identity 1.0.A PACE, EAC on MultiApp V5.0.A (version 1.0.A) active
- Digital Identity 1.0.A PACE, EAC on MultiApp V5.0.A(version 1.0.A) active
- Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 â PACE, EAC (version 1.0) active
- HID Global S.p.A. HIDApp-eDoc suite ICAO Application - EAC-PACE-AA Version 3_00 active
- HID Global S.p.A. SOMA-c016 Machine Readable Electronic Document ICAO Application - EAC-PACE-AA, version 4 active
- ID-One ePass Full EAC v2 MRTD en configuration EAC et PACE avec AA masqué sur les composants P60x080PVC/PVG archived
- ID-One ePass Full EAC v2 MRTD en configuration EAC et PACE avec AA masqué sur les composants P60x144PVA/PVE archived
- ID-One ePass Full EAC v2 MRTD en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x080PVC/PVG archived
- ID-One ePass Full EAC v2 MRTD en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x144PVA/PVE archived
- ID-One ePass Full EAC v2 en configuration EAC et PACE masqué sur les composants P60x080PVC/PVG archived
- ID-One ePass Full EAC v2 en configuration PACE masqué sur les composants P60x080PVC/PVG archived
- ID-One ePass IDL Full EACv2 in PACE MRTD configuration on Infineon SLE77CLFX2400P and SLE77CLFX2407P active
- IDEMIA TnD v5.1 on ID-One Cosmo X (PACE/EAC1/Polymorphic eMRTD/LDS2 configuration) active
- IDEMIA TnD v5.1 on ID-One Cosmo X (PACE/EAC1/Polymorphic eMRTD/LDS2 configuration) active
- IDEMIA TnD v5.1 on ID-One Cosmo X (PACE/EAC1/Polymorphic eMRTD/LDS2 configuration) active
- IDeal PASS, version 2.0.1 - Application EAC avec PACE active
- IDeal Pass v2.3-n JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration) archived
- IDentity Applet v3.4-p1/PACE-EAC1 on NXP JCOP 4 P71 active
- IDentity Applet v3.4-p2/PACE-EAC1 on NXP JCOP 4 P71 active
- IDentity Applet v3.4-p2/eIDAS on NXP JCOP 4 P71 active
- IDentity Applet v3.4/PACE-EAC1 on NXP JCOP 4 P71 active
- IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71 active
- IDentity Card v3.1/PACE-EAC1 archived
- IDentity Card v3.2/PACE-EAC1 archived
- IDmove v4 on Infineon in EAC with PACE configuration with AA in option archived
- IDmove v4 on Infineon in EAC with PACE configuration with AA in option OS Commercial Version : 0x 09 08 06 ; OS Unique Identifier : 0x DC 71 (ANSSI-CC-2019/57-R01) active
- IDmove v4 on Infineon in PACE configuration with AA and/or CA in option archived
- IDmove v4 on Infineon in PACE configuration with AA and/or CA in option OS Commercial Version : 0x 09 08 06 ; OS Unique Identifier : 0x DC 71 (ANSSI-CC-2019/58-R01) active
- IDmove v5 on SCR404U in PACE configuration with AA and/or CA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108 (ANSSI-CC-2023/66) active
- Ideal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration) archived
- Idemia CombICAO Applet in PACE and CA configuration on ID-ONE Cosmo V9 Essential archived
- Infineon Mercury ePassport v1.16 archived
- Infineon Mercury ePassport v2.20 active
- Infineon Voyager ePassport v2.20 active
- Infineon ePassport configuration of SECORAâą ID S Infineon Applet Collection - eMRTD V1.1 active
- KCOS e-Passport Version 5.0 - SAC, EAC and AA on S3D350A Family archived
- KONA2 D2320N ePassport [EAC with PACE configuration] version 02 revision 10 update 00 archived
- LDS Applet EAC with PACE on ID-One V8.2 Platform on NXP P60D145 (version 03 00 00 00) archived
- LDS Applet PACE with CAM, CA and AA on ID-One Cosmo V8.2 on NXP P60D145 (version 03 00 00 00) active
- LDS Applet PACE with CAM, CA and AA on ID-One V8.2 Platform on NXP P60D145 (version 03 00 00 00) archived
- MaskTech ePP Applet on Secora ID S v1.1 active
- NXP JAVA OS1 ChipDoc v1.0 ICAO EAC-SAC with optional AA on P60D080JVC archived
- NXP SmartePP Enhanced/Next-gen on P71 version 03 00 00 10 active
- NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite â Java Card applet configuration providing Machine Readable Travel Document with âICAO Applicationâ, Extended Access Control with PACE active
- NXP eDoc Suite v4.0 on JCOP4.5 P71 - cryptovision ePasslet Suite - Java Card applet configuration providing Machine Readable Travel Document with "ICAO Applicationâ, Extended Access Control with PACE active
- PWPW SmartApp-ID 3.1 (IFX) archived
- PWPW SmartApp-MRTD 1.0 active
- Pasaporte electrĂłnico versiĂłn 4.0 active
- Permiso de Residencia versiĂłn 4.0 active
- SECORAâą ID X Applet Collection with ePasslet Suite v3.5 by cryptovision GmbH, version 1.0 â Java Card applet configuration providing Machine Readable Travel Document with âICAO Applicationâ, Extended Access Control with PACE active
- SOMA-c004 e-Passport (EAC-SAC-AA), v1.0 archived
- SOMA-c007 Machine Readable Electronic Document EAC-PACE-AA version 4 (SOMA-c007_4) active
- SOMA-c016 Machine Readable Electronic Document ICAO Application - EAC-PACE-AA, version 3 active
- SOMA-c018 Machine Readable Electronic Document-EAC-PACE-AA version 2 (SOMAc018_2) active
- TnD v5.1 on Cosmo J in EAC with PACE Configuration active
- TnD v5.1 on ID-One Cosmo J V2 (PACE/EAC1/Polymorphic eMRTD/LDS2 configuration) active
- TnD v5.1 on ID-One Cosmo X (PACE/EAC1/Polymorphic eMRTD/LDS2 configuration) archived
- Veridos Suite v3.0 â cryptovision ePasslet Suite â Java Card applet configuration providing Machine Readable Travel Document with âICAO Applicationâ, Extended Access Control with PACE archived
- Veridos Suite v4.0 - cryptovision ePasslet Suite - Java Card applet configuration providing Machine-Readable Electronic Documents âICAO Applicationâ, Extended Access Control with PACE active
- Veridos ePass Applet on Sm@rtCafé Expert 8.0 C1, Version 1.0 active
- XSmart e-Passport V1.5 EAC with PACE on M7892 active
- cv act ePasslet Suite v2.1 â Java Card applet configuration providing Machine Readable Travel Document with âICAO Applicationâ, Extended Access Control with PACE archived
- ePass Applet on JCOP 4 C1 active
- ePass Applet on Sm@rtCaféŸ Expert 8.0 C2 v1.0 active
- eTravel 2.2 en configuration EAC sur SAC sur Plate-forme MultiApp v4.0 archived
- eTravel 2.5 EAC on SAC on MultiApp V5.0 (2.5.0.0) active
- eTravel 2.5.A EAC on SAC on MultiApp V5.0.A (version 2.5.A.0.0) active
- eTravel 2.5.A EAC on SAC on MultiApp V5.0.A(version 2.5.A.0.0) active
- eTravel 3.0 EAC on SAC on MultiApp v4.2 (version 3.0.0) active
- eTravel 3.1 EAC on SAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/36 ) active
- eTravel Essential 1.0 avec SAC, AA et EAC activés sur composants M7794 A12/G12 identifiant : B2 8C 01, version 01 02 active
- eTravel Essential 1.0, avec SAC, AA et EAC activés sur composant M7794 A12/G12 archived
- eTravel Essential 1.0, configuration"full" avec application PACE archived
- eTravel Essential 1.1, PACE, EAC and AA activated archived
- eTravel Essential 1.2 â PACE, EAC and AA activated (release â0300â) active
- eTravel Essential 1.2 â PACE, EAC and AA activated(release â0300â) active
- eTravel Essential 1.3-2.0 â PACE, EAC and AA activated (Version 1.0) active
- eTravel SAC/EAC/BAC V2.0 with Filter 5.0 on MultiApp V3 - Configuration SAC référence T1033550 archived
- eTravel v2.2 EAC/SAC on MultiApp v4.0.1 platform with Filter Set 1.0 version 1.0 active
- eTravel v2.3 on MultiApp v4.1 platform, PACE, EAC and AA activated(version 2.3.0.1) ( ANSSI-CC-2023/55 ) active
Updates ?
-
08.04.2025 The protection profile data changed.
Protection Profile changed
The CC portal data was updated.
- The maintenances property was set to
[['2014-07-31', 'Common Criteria Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2_ma1a_pdf.pdf']]
.
- The maintenances property was set to
-
03.03.2025 The protection profile data changed.
Protection Profile changed
The CC portal data was updated.
- The maintenances property was set to
[['2014-07-31', 'Common Criteria Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2_ma1a_pdf.pdf']]
.
- The maintenances property was set to
-
24.02.2025 The protection profile data changed.
Protection Profile changed
The CC portal data was updated.
- The maintenances property was set to
[['2014-07-31', 'Common Criteria Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2_ma1a_pdf.pdf']]
.
- The maintenances property was set to
-
18.02.2025 The protection profile data changed.
Protection Profile changed
The CC portal data was updated.
- The maintenances property was set to
[['2014-07-31', 'Common Criteria Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2_ma1a_pdf.pdf']]
.
- The maintenances property was set to
-
04.02.2025 The protection profile was first processed.
New Protection Profile
A new Protection Profile with the name Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP) was processed.
Raw data
{
"_id": "b380aabf93b29692",
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"dgst": "b380aabf93b29692",
"heuristics": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.Heuristics"
},
"pdf_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.PdfData",
"pp_filename": "pp0068_V2b_pdf.pdf",
"pp_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 3
}
},
"FF": {
"DH": {
"DH": 2,
"Diffie-Hellman": 5
}
}
},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0055-2009": 2,
"BSI-CC-PP-0056-2009": 1,
"BSI-CC-PP-0068-V2-2011": 73,
"BSI-PP-0035-2007": 1
}
},
"cc_sar": {
"ACE": {
"ACE_MAC": 1
},
"ADV": {
"ADV_ARC.1": 3,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 2
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_DVS.2": 5
},
"ASE": {
"ASE_ECD": 1
},
"ATE": {
"ATE_DPT.1": 1,
"ATE_DPT.2": 5,
"ATE_FUN.1": 1
},
"AVA": {
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL4": 13,
"EAL4 augmented": 3
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_SAS": 7,
"FAU_SAS.1": 9,
"FAU_SAS.1.1": 2
},
"FCS": {
"FCS_CKM": 16,
"FCS_CKM.1": 5,
"FCS_CKM.2": 2,
"FCS_CKM.4": 12,
"FCS_CKM.4.1": 1,
"FCS_COP": 14,
"FCS_COP.1": 4,
"FCS_RND": 7,
"FCS_RND.1": 11,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC": 6,
"FDP_ACC.1": 6,
"FDP_ACF": 9,
"FDP_ACF.1": 9,
"FDP_IFC.1": 2,
"FDP_ITC.1": 3,
"FDP_ITC.2": 3,
"FDP_RIP": 2,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_UCT": 4,
"FDP_UCT.1": 2,
"FDP_UIT": 4,
"FDP_UIT.1": 3
},
"FIA": {
"FIA_AFL": 6,
"FIA_AFL.1": 2,
"FIA_SOS.2": 1,
"FIA_UAU": 37,
"FIA_UAU.1": 3,
"FIA_UAU.4": 1,
"FIA_UAU.5": 2,
"FIA_UAU.6": 1,
"FIA_UID": 8,
"FIA_UID.1": 4
},
"FMT": {
"FMT_LIM": 7,
"FMT_LIM.1": 15,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 15,
"FMT_LIM.2.1": 3,
"FMT_MSA.1": 1,
"FMT_MSA.3": 2,
"FMT_MTD": 22,
"FMT_MTD.1": 8,
"FMT_SMF.1": 16,
"FMT_SMF.1.1": 1,
"FMT_SMR": 13,
"FMT_SMR.1": 2
},
"FPT": {
"FPT_EMS": 7,
"FPT_EMS.1": 8,
"FPT_EMS.1.1": 3,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_PHP.3": 7,
"FPT_PHP.3.1": 1,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 2
},
"FTP": {
"FTP_ITC": 11,
"FTP_ITC.1": 6,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"to the plastic travel document is achieved by physical and organisational security measures being out of scope of the current PP. The TOE shall comprise at least i) the circuitry of the contactless/contact chip": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 305
}
},
"crypto_scheme": {
"KA": {
"Key Agreement": 1
},
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {
"EF": {
"EF.COM": 1,
"EF.DG1": 5,
"EF.DG16": 3,
"EF.DG2": 3,
"EF.DG3": 1,
"EF.DG4": 1,
"EF.DG5": 1,
"EF.SOD": 3
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 3,
"Physical Tampering": 2,
"Physical tampering": 2,
"fault injection": 1,
"malfunction": 6,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"SPA": 1,
"physical probing": 3,
"timing attacks": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 1,
"CCMB-2007-09-001": 1,
"CCMB-2007-09-002": 2,
"CCMB-2007-09-003": 2,
"CCMB-2007-09-004": 2
},
"ICAO": {
"ICAO": 8
},
"ISO": {
"ISO/IEC 14443": 4,
"ISO/IEC 7816-2": 1,
"ISO/IEC 7816-4": 1
},
"PKCS": {
"PKCS#3": 3
},
"RFC": {
"RFC 3369": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 7
}
},
"DES": {
"3DES": {
"3DES": 4,
"Triple-DES": 4
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 2,
"KMAC": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"pp_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20111206140932+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "PACE PP, BSI-CC-PP-0068-V2-2011",
"/ModDate": "D:20111206151514+01\u002700\u0027",
"/Producer": "OpenOffice.org 3.2",
"/Subject": "PACE PP",
"/Title": "Common Criteria Protection Profile BSI-CC-PP-0068-V2-2011",
"pdf_file_size_bytes": 929672,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 72
},
"report_filename": "pp0068_V2a_pdf.pdf",
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0068-2010": 3,
"BSI-CC-PP-0068-V2-2011": 15
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 2,
"APE_ECD.1": 2,
"APE_INT.1": 2,
"APE_OBJ.1": 1,
"APE_OBJ.2": 2,
"APE_REQ.1": 1,
"APE_REQ.2": 2,
"APE_SPD.1": 2
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 4,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 3,
"EAL 4 augmented": 2,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 7,
"EAL5": 6,
"EAL6": 3,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"Document using Standard Inspection Procedure with PACE, SRC Security Research \u0026 Consulting GmbH (confidential document) [6] Protection Profile BSI-CC-PP-0068-V2-2011, Machine Readable Travel Document using Standard": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 13
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"SRC": {
"SRC Security Research \u0026 Consulting": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 32": 1,
"AIS 38": 1
},
"ICAO": {
"ICAO": 4
}
},
"symmetric_crypto": {},
"technical_report_id": {
"BSI": {
"BSI 2": 1,
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1,
"BSI TR-03110": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20111205084515+01\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, Protection Profile, Schutzprofil, PACE, SAC, PACE_PP\"",
"/ModDate": "D:20111205084937+01\u002700\u0027",
"/Producer": "OpenOffice.org 3.2",
"/Subject": "PACE_PP",
"/Title": "Certification Report BSI-CC-PP-0068-V2-2011",
"pdf_file_size_bytes": 784692,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 28
}
},
"state": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.InternalState",
"pp": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "61560ad7c7e62c42f80b3dc0a42bc60872dcf923a4117ff5a2aaee110cba4e26",
"txt_hash": "622084d8ee5b2bc1a499ea4a008f2258530e554e6da8463c4a45cc2e89271d0c"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4e6894dda13faf460a9013bd331916783474c3555962f296cf6665bb60b0ba71",
"txt_hash": "6e256e8cc067ef421a8475a1ee02e4afb5dc7c9d1fa1c8cf7ff48e03dc4f5cf1"
}
},
"web_data": {
"_type": "sec_certs.sample.protection_profile.ProtectionProfile.WebData",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"is_collaborative": false,
"maintenances": [
[
"2014-07-31",
"Common Criteria Protection Profile Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2_ma1a_pdf.pdf"
]
],
"name": "Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)",
"not_valid_after": null,
"not_valid_before": "2011-11-10",
"pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf",
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VAN.5",
"EAL4+",
"ATE_DPT.2"
]
},
"status": "active",
"version": "Version 1.0"
}
}