MS6003, rev C
CSV information ?
Status | active |
---|---|
Valid from | 16.04.2020 |
Valid until | 16.04.2025 |
Scheme | 🇫🇷 FR |
Manufacturer | Wisekey |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
Protection profiles |
Heuristics summary ?
Certificate ?
Extracted keywords
Security Assurance Requirements (SAR)
ALC_DVS.2Protection profiles
BSI-CC-PP-0084-2014Certificates
ANSSI-CC-2020/20File metadata
Title | ANSSI-CC-2020/20 |
---|---|
Subject | CER/F/14.2 |
Author | Christian Benardeau |
Creation date | D:20200421121429+02'00' |
Modification date | D:20200421121429+02'00' |
Pages | 1 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Certification report ?
Extracted keywords
Security level
EAL 5, EAL2, EAL7, EAL4, EAL 1, EAL 3, EAL 7, EAL 5 augmented, ITSEC E6 HighSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0084-2014, BSI-PP-0084-2014Certificates
ANSSI-CC-2020/20, ANSSI-CC-2018/02Evaluation facilities
Serma Safety & Security, CESTI, CEA - LETIStandards
AIS 31, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Title | ANSSI-CC-2020/20 |
---|---|
Subject | MS6003 |
Keywords | ANSSI-CC-CER-F-07.024 |
Author | Coralie |
Creation date | D:20200528181029+02'00' |
Pages | 14 |
Creator | Writer |
Producer | LibreOffice 4.4 |
References
Outgoing- ANSSI-CC-2018/02 - active - Microcontrôleur MS6001 révision E embarquant la bibliothèque cryptographique Toolbox version 06.04.01.07 et la bibliothèqueWear Levelling version 06.03.02.02
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDESAsymmetric Algorithms
ECDSA, ECCHash functions
SHA-1, SHA-224, SHA-384, SHA-256, SHA-512Protocols
PGPRandomness
RNG, RNDSecurity level
EAL5, EAL4, EAL5+, EAL4+Claims
O.C, O.RND, T.RND, R.OSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FAU_GEN.1, FAU_GEN, FAU_SAS, FCS_COP.1, FCS_RNG.1, FCS_COP, FCS_CKM.1, FCS_CKM.4, FCS_COP.1.1, FDP_UTC.1, FDP_UIT.1, FDP_ACC, FDP_ACF, FDP_SDC.1, FDP_ITT.1, FDP_IFC.1, FDP_SDI.2, FDP_UCT.1, FDP_SDC.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACC.1, FDP_ITT.1.1, FDP_IFF.1, FDP_IFC.1.1, FDP_ITC.1, FDP_ITC.2, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FIA_API.1, FIA_API.1.1, FIA_API, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MSA.3, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_FLS.1.1, FPT_PHP.3.1, FPT_ITT.1.1, FPT_SDI.2, FRU_FLT.2, FRU_FLT.1, FRU_FLT.2.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Protection profiles
BSI-CC-PP-0084-2014Side-channel analysis
Leak-Inherent, physical probing, Physical Probing, Physical probing, side channel, timing attacks, physical tampering, Malfunction, malfunction, Fault Injection, JHASStandards
FIPS 197, FIPS 186-4, FIPS 180-4, NIST SP 800-67, NIST SP 800-38A, PKCS#1, AIS31, ISO/IEC 3309, SCP03File metadata
Title | MS6001 Security Target-Lite |
---|---|
Subject | Security Target-Lite |
Author | Graeme Calder |
Creation date | D:20200331111154+02'00' |
Modification date | D:20200331111514+02'00' |
Pages | 78 |
Creator | Microsoft® Word 2013 |
Producer | Microsoft® Word 2013 |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2Scheme data ?
Product | MS6003, rev C | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/ms6003-rev-c | |
Description | Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés, applications bancaires, télévision à péage, transport, santé, etc.) en fonction des logiciels applicatifs | |
Sponsor | WISEKEY | |
Developer | WISEKEY | |
Cert Id | ANSSI-CC-2020/20 | |
Level | EAL5+ | |
Expiration Date | 16.04.2025 | |
Enhanced | ||
Cert Id | ANSSI-CC-2020/20 | |
Certification Date | 16.04.2020 | |
Expiration Date | 16.04.2025 | |
Category | Micro-circuits | |
Cc Version | Critères Communs version 3.1r5 | |
Developer | WISEKEY | |
Sponsor | WISEKEY | |
Evaluation Facility | CEA-Leti | |
Level | EAL5+ | |
Protection Profile | BSI-CC-PP-0084-2014 | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | AVA_VAN.5, ALC_DVS.2 | |
Report Link | https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_20en.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_20en.pdf |
References ?
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'ANSSI-CC-2020/20', 'expiration_date': '2025-04-16', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2020/20', 'certification_date': '2020-04-16', 'expiration_date': '2025-04-16', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The scheme_data property was updated, with the
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['BAROC_SC_PP_V1.0', 'JAVA_OC', 'SECURITY_IC_AUGP_V1.0']}}]}
.
- The new value is
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'MS6003, rev C', 'url': 'https://cyber.gouv.fr/produits-certifies/ms6003-rev-c', 'description': 'Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés, applications bancaires, télévision à péage, transport, santé, etc.) en fonction des logiciels applicatifs', 'sponsor': 'WISEKEY', 'developer': 'WISEKEY', 'cert_id': '2020/20', 'level': 'EAL5+', 'expiration_date': '16 Avril 2025', 'enhanced': {'cert_id': '2020/20', 'certification_date': '16/04/2020', 'expiration_date': '16/04/2025', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'WISEKEY', 'sponsor': 'WISEKEY', 'evaluation_facility': 'CEA-Leti', 'level': 'EAL5+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'AVA_VAN.5, ALC_DVS.2', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_20en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_20en.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '53b6bb4474d0dc50f5917b3349b4835e8a9f7d8935a0d3903f78d2c45d3ad68c', 'txt_hash': '8875c2099a8d4a138fff6c173dafe5a69d66c5750fe131dbe80128f2b6fbb24b'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e693d943ceb2fda04092fcaf85edf5bc505ea30f38d72b874a954135a43d8dcb', 'txt_hash': '8f0c7729a309a20ffd0a3237fae4bbe94f8473dd657bfdc1a32f543f1be0e9fd'}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1435553, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 78, '/Author': 'Graeme Calder', '/CreationDate': "D:20200331111154+02'00'", '/Creator': 'Microsoft® Word 2013', '/ModDate': "D:20200331111514+02'00'", '/Producer': 'Microsoft® Word 2013', '/Subject': 'Security Target-Lite', '/Title': 'MS6001 Security Target-Lite', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.insidesecure.com/', 'mailto:[email protected]', 'http://www.ssi.gouv.fr/index.html']}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 726573, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'ANSSI-CC-2020/20', '/Author': 'Christian Benardeau', '/Subject': 'CER/F/14.2', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20200421121429+02'00'", '/ModDate': "D:20200421121429+02'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 20}}, 'cc_security_level': {'EAL': {'EAL5': 9, 'EAL4': 2, 'EAL5+': 1, 'EAL4+': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_FSP.5': 1, 'ADV_IMP.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.4': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 5, 'ALC_CMC.4': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.2': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.3': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN': 1, 'AVA_VAN.5': 5}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 13, 'FAU_SAS.1.1': 1, 'FAU_GEN.1': 1, 'FAU_GEN': 1, 'FAU_SAS': 1}, 'FCS': {'FCS_COP.1': 16, 'FCS_RNG.1': 20, 'FCS_COP': 16, 'FCS_CKM.1': 13, 'FCS_CKM.4': 13, 'FCS_COP.1.1': 13}, 'FDP': {'FDP_UTC.1': 1, 'FDP_UIT.1': 8, 'FDP_ACC': 15, 'FDP_ACF': 13, 'FDP_SDC.1': 12, 'FDP_ITT.1': 22, 'FDP_IFC.1': 28, 'FDP_SDI.2': 8, 'FDP_UCT.1': 9, 'FDP_SDC.1.1': 1, 'FDP_SDI.1': 3, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ACC.1': 6, 'FDP_ITT.1.1': 1, 'FDP_IFF.1': 3, 'FDP_IFC.1.1': 1, 'FDP_ITC.1': 13, 'FDP_ITC.2': 13, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ACF.1': 5, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1}, 'FIA': {'FIA_API.1': 9, 'FIA_API.1.1': 1, 'FIA_API': 1}, 'FMT': {'FMT_LIM': 20, 'FMT_LIM.1': 24, 'FMT_LIM.2': 27, 'FMT_LIM.1.1': 1, 'FMT_LIM.2.1': 1, 'FMT_MSA.3': 3}, 'FPT': {'FPT_FLS.1': 24, 'FPT_ITT.1': 20, 'FPT_PHP.3': 25, 'FPT_FLS.1.1': 1, 'FPT_PHP.3.1': 1, 'FPT_ITT.1.1': 1, 'FPT_SDI.2': 2}, 'FRU': {'FRU_FLT.2': 19, 'FRU_FLT.1': 1, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 15, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1, 'FTP_TRP.1': 6}}, 'cc_claims': {'O': {'O.C': 2, 'O.RND': 4}, 'T': {'T.RND': 3}, 'R': {'R.O': 2}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 14}}, 'DES': {'DES': {'DES': 6}, '3DES': {'TDES': 10}}}, 'asymmetric_crypto': {'ECC': {'ECDSA': {'ECDSA': 19}, 'ECC': {'ECC': 6}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-224': 3, 'SHA-384': 3, 'SHA-256': 2, 'SHA-512': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'PGP': {'PGP': 1}}, 'randomness': {'RNG': {'RNG': 15, 'RND': 7}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 16, 'physical probing': 4, 'Physical Probing': 1, 'Physical probing': 1, 'side channel': 3, 'timing attacks': 1}, 'FI': {'physical tampering': 2, 'Malfunction': 19, 'malfunction': 7, 'Fault Injection': 1}, 'other': {'JHAS': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 197': 1, 'FIPS 186-4': 4, 'FIPS 180-4': 5}, 'NIST': {'NIST SP 800-67': 1, 'NIST SP 800-38A': 1}, 'PKCS': {'PKCS#1': 2}, 'BSI': {'AIS31': 13}, 'ISO': {'ISO/IEC 3309': 2}, 'SCP': {'SCP03': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The cert_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2020/20': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
anssi-cible-cc-2020_20en.pdf
. - The cert_filename property was set to
CertificatCC-2020_20.pdf
.
The computed heuristics were updated.
- The report_references property was updated, with the
{'indirectly_referencing': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/16']}}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values added.
- The st property was updated, with the
-
19.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3d5f0be493ebdca1b62e444668beb8a3be63b6e57ef42bb273b457980ec313bf', 'txt_hash': '0e3853da25e1ff8312e5dc0497060a5de2cf1c99a1749c202d9ad5c602800e7d'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 244629, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/Title': 'ANSSI-CC-2020/20', '/Author': 'Coralie', '/Subject': 'MS6003', '/Keywords': 'ANSSI-CC-CER-F-07.024', '/Creator': 'Writer', '/Producer': 'LibreOffice 4.4', '/CreationDate': "D:20200528181029+02'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}
. - The report_frontpage property was set to
{'FR': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2020/20': 15, 'ANSSI-CC-2018/02': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1, 'BSI-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 2, 'EAL2': 1, 'EAL7': 1, 'EAL4': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1, 'EAL 5 augmented': 1}, 'ITSEC': {'ITSEC E6 High': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'Serma Safety & Security': 2}, 'CESTI': {'CESTI': 2}, 'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 31': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'org': {'org': 1}}, 'certification_process': {}}
. - The report_filename property was set to
anssi-cc-2020_20en.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
ANSSI-CC-2020/20
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/02']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2018/02']}}
data.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_20en.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_20en.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The scheme_data property was set to
{'product': 'MS6003, rev C', 'url': 'https://cyber.gouv.fr/produits-certifies/ms6003-rev-c', 'description': 'Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (documents d’identité sécurisés, applications bancaires, télévision à péage, transport, santé, etc.) en fonction des logiciels applicatifs', 'sponsor': 'WISEKEY', 'developer': 'WISEKEY', 'cert_id': '2020/20', 'level': 'EAL5+', 'expiration_date': '16 Avril 2025', 'enhanced': {'cert_id': '2020/20', 'certification_date': '16/04/2020', 'expiration_date': '16/04/2025', 'category': 'Micro-circuits', 'cc_version': 'Critères Communs version 3.1r5', 'developer': 'WISEKEY', 'sponsor': 'WISEKEY', 'evaluation_facility': 'CEA-Leti', 'level': 'EAL5+', 'protection_profile': 'BSI-CC-PP-0084-2014', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'AVA_VAN.5, ALC_DVS.2', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_20en.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_20en.pdf'}}
.
- The report_references property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name MS6003, rev C was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CertificatCC-2020_20.pdf",
"dgst": "2344e16062cfc712",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2020/20",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2018/02"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2016/16",
"ANSSI-CC-2018/02"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2020/20",
"description": "Le microcontr\u00f4leur seul n\u2019est pas un produit utilisable en tant que tel. Il est destin\u00e9 \u00e0 h\u00e9berger une ou plusieurs applications. Il peut \u00eatre ins\u00e9r\u00e9 dans un support plastique pour constituer une carte \u00e0 puce. Les usages possibles de cette carte sont multiples (documents d\u2019identit\u00e9 s\u00e9curis\u00e9s, applications bancaires, t\u00e9l\u00e9vision \u00e0 p\u00e9age, transport, sant\u00e9, etc.) en fonction des logiciels applicatifs",
"developer": "WISEKEY",
"enhanced": {
"augmented": "AVA_VAN.5, ALC_DVS.2",
"category": "Micro-circuits",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "ANSSI-CC-2020/20",
"certification_date": "2020-04-16",
"developer": "WISEKEY",
"evaluation_facility": "CEA-Leti",
"expiration_date": "2025-04-16",
"level": "EAL5+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "BSI-CC-PP-0084-2014",
"report_link": "https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cc-2020_20en.pdf",
"sponsor": "WISEKEY",
"target_link": "https://cyber.gouv.fr/sites/default/files/2020/04/anssi-cible-cc-2020_20en.pdf"
},
"expiration_date": "2025-04-16",
"level": "EAL5+",
"product": "MS6003, rev C",
"sponsor": "WISEKEY",
"url": "https://cyber.gouv.fr/produits-certifies/ms6003-rev-c"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Wisekey",
"manufacturer_web": "https://www.wisekey.com",
"name": "MS6003, rev C",
"not_valid_after": "2025-04-16",
"not_valid_before": "2020-04-16",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "CertificatCC-2020_20.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2020/20": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1
}
},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/Author": "Christian Benardeau",
"/CreationDate": "D:20200421121429+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20200421121429+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"/Subject": "CER/F/14.2",
"/Title": "ANSSI-CC-2020/20",
"pdf_file_size_bytes": 726573,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "anssi-cc-2020_20en.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2018/02": 2,
"ANSSI-CC-2020/20": 15
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 1,
"BSI-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 2,
"EAL 5 augmented": 1,
"EAL 7": 1,
"EAL2": 1,
"EAL4": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 High": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1
},
"CESTI": {
"CESTI": 2
},
"Serma": {
"Serma Safety \u0026 Security": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"org": {
"org": 1
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"BSI": {
"AIS 31": 2
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Coralie",
"/CreationDate": "D:20200528181029+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "ANSSI-CC-CER-F-07.024",
"/Producer": "LibreOffice 4.4",
"/Subject": "MS6003",
"/Title": "ANSSI-CC-2020/20",
"pdf_file_size_bytes": 244629,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ssi.gouv.fr/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 14
},
"st_filename": "anssi-cible-cc-2020_20en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 6
},
"ECDSA": {
"ECDSA": 19
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.C": 2,
"O.RND": 4
},
"R": {
"R.O": 2
},
"T": {
"T.RND": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0084-2014": 20
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 4,
"ADV_FSP.5": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 5,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4+": 1,
"EAL5": 9,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 1,
"FAU_SAS": 1,
"FAU_SAS.1": 13,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 13,
"FCS_CKM.4": 13,
"FCS_COP": 16,
"FCS_COP.1": 16,
"FCS_COP.1.1": 13,
"FCS_RNG.1": 20
},
"FDP": {
"FDP_ACC": 15,
"FDP_ACC.1": 6,
"FDP_ACF": 13,
"FDP_ACF.1": 5,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_IFC.1": 28,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 3,
"FDP_ITC.1": 13,
"FDP_ITC.2": 13,
"FDP_ITT.1": 22,
"FDP_ITT.1.1": 1,
"FDP_SDC.1": 12,
"FDP_SDC.1.1": 1,
"FDP_SDI.1": 3,
"FDP_SDI.2": 8,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT.1": 9,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 8,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1,
"FDP_UTC.1": 1
},
"FIA": {
"FIA_API": 1,
"FIA_API.1": 9,
"FIA_API.1.1": 1
},
"FMT": {
"FMT_LIM": 20,
"FMT_LIM.1": 24,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 27,
"FMT_LIM.2.1": 1,
"FMT_MSA.3": 3
},
"FPT": {
"FPT_FLS.1": 24,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 20,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 25,
"FPT_PHP.3.1": 1,
"FPT_SDI.2": 2
},
"FRU": {
"FRU_FLT.1": 1,
"FRU_FLT.2": 19,
"FRU_FLT.2.1": 1
},
"FTP": {
"FTP_ITC.1": 15,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1,
"FTP_TRP.1": 6
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PGP": {
"PGP": 1
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-224": 3,
"SHA-256": 2,
"SHA-384": 3,
"SHA-512": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 7,
"RNG": 15
}
},
"side_channel_analysis": {
"FI": {
"Fault Injection": 1,
"Malfunction": 19,
"malfunction": 7,
"physical tampering": 2
},
"SCA": {
"Leak-Inherent": 16,
"Physical Probing": 1,
"Physical probing": 1,
"physical probing": 4,
"side channel": 3,
"timing attacks": 1
},
"other": {
"JHAS": 1
}
},
"standard_id": {
"BSI": {
"AIS31": 13
},
"FIPS": {
"FIPS 180-4": 5,
"FIPS 186-4": 4,
"FIPS 197": 1
},
"ISO": {
"ISO/IEC 3309": 2
},
"NIST": {
"NIST SP 800-38A": 1,
"NIST SP 800-67": 1
},
"PKCS": {
"PKCS#1": 2
},
"SCP": {
"SCP03": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 14
}
},
"DES": {
"3DES": {
"TDES": 10
},
"DES": {
"DES": 6
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Graeme Calder",
"/CreationDate": "D:20200331111154+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/ModDate": "D:20200331111514+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"/Subject": "Security Target-Lite",
"/Title": "MS6001 Security Target-Lite",
"pdf_file_size_bytes": 1435553,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/index.html",
"http://www.insidesecure.com/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 78
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"SECURITY_IC_AUGP_V1.0",
"JAVA_OC",
"BAROC_SC_PP_V1.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
"pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_20en.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"ALC_DVS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_20en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e693d943ceb2fda04092fcaf85edf5bc505ea30f38d72b874a954135a43d8dcb",
"txt_hash": "8f0c7729a309a20ffd0a3237fae4bbe94f8473dd657bfdc1a32f543f1be0e9fd"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3d5f0be493ebdca1b62e444668beb8a3be63b6e57ef42bb273b457980ec313bf",
"txt_hash": "0e3853da25e1ff8312e5dc0497060a5de2cf1c99a1749c202d9ad5c602800e7d"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "53b6bb4474d0dc50f5917b3349b4835e8a9f7d8935a0d3903f78d2c45d3ad68c",
"txt_hash": "8875c2099a8d4a138fff6c173dafe5a69d66c5750fe131dbe80128f2b6fbb24b"
}
},
"status": "active"
}