This page was not yet optimized for use on mobile
devices.
IDEAL CITIZ V2.17-I on Infineon M7892 B11 embedding ID.me 1.6-i application
CSV information
| Status | archived |
|---|---|
| Valid from | 05.10.2018 |
| Valid until | 20.06.2025 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Idemia |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL5+, AVA_VAN.5, ALC_DVS.2 |
| Protection profiles | |
| Maintenance updates | IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application (Version 1.6-i / v 2.0.15.0.0) (07.11.2019) Certification report |
| Reassessment report: ANSSI-CC-2018/44-S01 (03.12.2021) Certification report |
Heuristics summary
Certificate ID: ANSSI-CC-2018/44-S01
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Vendor
Infineon, IDEMIASecurity level
EAL5, EAL2Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5Certificates
ANSSI-CC-2018/44-S01Evaluation facilities
CEA-LETIFile metadata
| Creation date | D:20211207160024+01'00' |
|---|---|
| Modification date | D:20211207160024+01'00' |
| Pages | 2 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Distiller 11.0 (Windows) |
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, 3DES, KMAC, CMACAsymmetric Algorithms
RSA-PSS, RSA-OAEP, ECDH, ECDSA, ECC, DHHash functions
SHA-1, SHA-224, SHA-384, SHA-512, SHA-256, SHA-2Schemes
MAC, Key agreementProtocols
PACERandomness
RNGLibraries
v1.02.013Block cipher modes
CBCIC data groups
EF.CardAccess, EF.ChipSecurityVendor
Infineon, IDEMIASecurity level
EAL 5+, EAL 6+, EAL5, EAL6, EAL6+, EAL 5, EAL5+, EAL4+, EAL4, EAL5 augmented, EAL6 augmented, EAL 5 augmented, EAL4 augmentedClaims
D.SCD, D.SVD, A.CSP, A.CGA, A.SCA, OE.HI_VAD, OE.HID_VADSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN, FCS_RND, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_RND.1, FCS_RND.1.1, FCS_COP.1.1, FCS_CKM.4.1, FCS_CKM.1.1, FCS_CKM, FCS_COP, FCS_CKM.2, FDP_UIT, FDP_DAU, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_SDI, FDP_ITC, FDP_UCT, FDP_SDI.2, FDP_RIP.1.1, FDP_ACC.1, FDP_ACF.1, FDP_UCT.1, FDP_ITC.1, FDP_DAU.2, FDP_UIT.1, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_API.1.1, FIA_SOS.2, FIA_UID.1.1, FIA_UID.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU, FIA_UAU.5, FIA_AFL, FIA_UAU.6, FIA_UID, FIA_UAU.4, FMT_LIM, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4.1, FMT_MTD.1, FMT_SMR, FMT_MTD.3, FMT_MTD.3.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0068-V2-, BSI-PP-0035, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013, BSI-CC-PP-0086, ANSSI-CC-PP-, PP-SSCD3, PP-SSCD4, PP-SSCD5, PP-SSCD6, PP-SSCD2Certificates
BSI-DSZ-CC-0782-V4-2018, ANSSI-CC-2018/27Evaluation facilities
CEA-LETISide-channel analysis
physical probing, side channel, DPA, SPA, timing attacks, physical tampering, Physical Tampering, malfunction, Malfunction, DFA, fault injectionCertification process
out of scope, ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE, ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDeal Citiz v2.17-i Java Card Open Platform enforces separation of the data betweenStandards
FIPS PUB 180-2, FIPS180-4, NIST SP 800-38B, PKCS#1, PKCS1, AIS31, ISO/IEC 7816-4, ISO/IEC 9797-, ISO/IEC 9797-1, ISO/IEC 15408:2005, ICAO, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2012-09-004Technical reports
BSI TR-03110File metadata
| Title | Title |
|---|---|
| Author | G509704 |
| Creation date | D:20180925153329+02'00' |
| Modification date | D:20180925153329+02'00' |
| Pages | 143 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
References
Outgoing- BSI-DSZ-CC-0782-V4-2018 - archived - Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003, EC v1.02.013 or v2.07.003, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003, and Toolbox v1.02.013 or v2.07.003 libraries and with specific IC dedicated software (firmware)
- ANSSI-CC-2018/27 - archived - IDeal Citiz v2.17-i on Infineon M7892 B11 Java Card Open Platform
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2018/44-S01Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0) | ANSSI-CC-2019/32 | Compare |
| IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application | ANSSI-CC-2018/22 | Compare |
| IDeal Citiz v2.15-i on Infineon M7892 B11 embedding MICAO BAC 1.3.69 application | ANSSI-CC-2017/65 | Compare |
References
Loading...
Updates Feed
-
The certificate became unavailable — it disappeared from the upstream listing.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "1a628b5ce7f4b999",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2018/44-S01",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.6",
"2.17"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"cb889a58ddbeb837"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2018/27",
"BSI-DSZ-CC-0782-V4-2018"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2018/27",
"BSI-DSZ-CC-0782-V4-2018"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2019-11-07",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_44-m01.pdf",
"maintenance_st_link": null,
"maintenance_title": "IDeal Citiz v2.17-i on Infineon M7892 B11 embedding ID.me 1.6-i application (Version 1.6-i / v 2.0.15.0.0)"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2021-12-03",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_44-s01fr.pdf",
"maintenance_st_link": null,
"maintenance_title": "Reassessment report: ANSSI-CC-2018/44-S01"
}
]
},
"manufacturer": "Idemia",
"manufacturer_web": "https://www.idemia.com",
"name": "IDEAL CITIZ V2.17-I on Infineon M7892 B11 embedding ID.me 1.6-i application",
"not_valid_after": "2025-06-20",
"not_valid_before": "2018-10-05",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "certificat-anssi-cc-2018_44-s01fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2018/44-S01": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL5": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA-LETI": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 2
},
"Infineon": {
"Infineon": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "D:20211207160024+01\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20211207160024+01\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 280419,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 2
},
"st_filename": "anssi-cible-cc-2018_44en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 17
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 4
}
},
"FF": {
"DH": {
"DH": 2
}
},
"RSA": {
"RSA-OAEP": 1,
"RSA-PSS": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782-V4-2018": 2
},
"FR": {
"ANSSI-CC-2018/27": 1
}
},
"cc_claims": {
"A": {
"A.CGA": 6,
"A.CSP": 9,
"A.SCA": 5
},
"D": {
"D.SCD": 1,
"D.SVD": 1
},
"OE": {
"OE.HID_VAD": 7,
"OE.HI_VAD": 2
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-": 1
},
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0068-V2-": 1,
"BSI-CC-PP-0071-2012": 1,
"BSI-CC-PP-0072-2012": 1,
"BSI-CC-PP-0075-2012": 1,
"BSI-CC-PP-0076-2013": 1,
"BSI-CC-PP-0086": 1,
"BSI-PP-0035": 1
},
"other": {
"PP-SSCD2": 21,
"PP-SSCD3": 21,
"PP-SSCD4": 24,
"PP-SSCD5": 18,
"PP-SSCD6": 23
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 5,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 1,
"ADV_FSP.5": 8,
"ADV_IMP.1": 8,
"ADV_TDS.1": 2,
"ADV_TDS.3": 3,
"ADV_TDS.4": 8
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 5,
"AGD_PRE": 2,
"AGD_PRE.1": 5
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 8,
"ALC_LCD.1": 3,
"ALC_TAT.1": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL 5 augmented": 1,
"EAL 5+": 1,
"EAL 6+": 1,
"EAL4": 3,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL5": 3,
"EAL5 augmented": 3,
"EAL5+": 1,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FCS": {
"FCS_CKM": 24,
"FCS_CKM.1": 25,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 31,
"FCS_CKM.4.1": 1,
"FCS_COP": 40,
"FCS_COP.1": 17,
"FCS_COP.1.1": 1,
"FCS_RND": 5,
"FCS_RND.1": 20,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC": 67,
"FDP_ACC.1": 19,
"FDP_ACF": 56,
"FDP_ACF.1": 30,
"FDP_DAU": 9,
"FDP_DAU.2": 2,
"FDP_IFC.1": 9,
"FDP_ITC": 11,
"FDP_ITC.1": 9,
"FDP_ITC.2": 6,
"FDP_RIP.1": 25,
"FDP_RIP.1.1": 1,
"FDP_SDI": 20,
"FDP_SDI.2": 4,
"FDP_UCT": 22,
"FDP_UCT.1": 2,
"FDP_UIT": 18,
"FDP_UIT.1": 4
},
"FIA": {
"FIA_AFL": 36,
"FIA_AFL.1": 13,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 19,
"FIA_API.1": 12,
"FIA_API.1.1": 2,
"FIA_SOS.2": 1,
"FIA_UAU": 93,
"FIA_UAU.1": 23,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 1,
"FIA_UAU.5": 3,
"FIA_UAU.6": 2,
"FIA_UID": 34,
"FIA_UID.1": 25,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM": 5,
"FMT_LIM.1": 14,
"FMT_LIM.1.1": 2,
"FMT_LIM.2": 13,
"FMT_LIM.2.1": 2,
"FMT_MOF.1": 9,
"FMT_MOF.1.1": 1,
"FMT_MSA": 21,
"FMT_MSA.1": 5,
"FMT_MSA.2": 11,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 24,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 13,
"FMT_MSA.4.1": 1,
"FMT_MTD": 176,
"FMT_MTD.1": 15,
"FMT_MTD.3": 11,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 57,
"FMT_SMF.1.1": 1,
"FMT_SMR": 28,
"FMT_SMR.1": 37,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 5,
"FPT_EMS.1": 16,
"FPT_EMS.1.1": 4,
"FPT_EMS.1.2": 3,
"FPT_FLS.1": 12,
"FPT_FLS.1.1": 1,
"FPT_PHP.1": 7,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 15,
"FPT_PHP.3.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 17,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 73,
"FTP_ITC.1": 22,
"FTP_TRP.1": 4
}
},
"certification_process": {
"OutOfScope": {
"ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE": 1,
"ii) the TOE and the CGA. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDeal Citiz v2.17-i Java Card Open Platform enforces separation of the data between": 1,
"out of scope": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 11
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 8
}
},
"crypto_protocol": {
"PACE": {
"PACE": 118
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 1
},
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA-LETI": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 7
},
"SHA2": {
"SHA-2": 2,
"SHA-224": 5,
"SHA-256": 5,
"SHA-384": 5,
"SHA-512": 4
}
}
},
"ic_data_group": {
"EF": {
"EF.CardAccess": 2,
"EF.ChipSecurity": 1
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Malfunction": 5,
"Physical Tampering": 1,
"fault injection": 1,
"malfunction": 5,
"physical tampering": 7
},
"SCA": {
"DPA": 3,
"SPA": 3,
"physical probing": 3,
"side channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 5
},
"CC": {
"CCMB-2012-09-004": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS PUB 180-2": 2,
"FIPS180-4": 1
},
"ICAO": {
"ICAO": 2
},
"ISO": {
"ISO/IEC 15408:2005": 2,
"ISO/IEC 7816-4": 1,
"ISO/IEC 9797-": 1,
"ISO/IEC 9797-1": 2
},
"NIST": {
"NIST SP 800-38B": 1
},
"PKCS": {
"PKCS#1": 4,
"PKCS1": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 20
}
},
"DES": {
"3DES": {
"3DES": 10,
"TDES": 9
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 5,
"KMAC": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-03110": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 17
},
"Infineon": {
"Infineon": 14
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "G509704",
"/CreationDate": "D:20180925153329+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20180925153329+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "Title",
"pdf_file_size_bytes": 2635084,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 143
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/authpp[1].pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2018_44-s01fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"ALC_DVS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_44en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "660198a3aa416292eb1ca0855ebfbc5756e80a05832e12260d9e61530f3020b1",
"txt_hash": "96e3940607a61cdc4c5927c2a02647f727a67f9ab90a747496424c3198e523b5"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "78b474aa11b4540e07e5d291ecb70d5404c9617268614c9ff67d1a68cb6a8284",
"txt_hash": "143e16ade05bd81cfe8fb22f6bb76e0a92d6b9b6250f53ec7d0c56a323ce85df"
}
},
"status": "archived"
}