IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application
CSV information ?
Status | archived |
---|---|
Valid from | 09.07.2018 |
Valid until | 09.07.2023 |
Scheme | đ«đ· FR |
Manufacturer | Idemia |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESAsymmetric Algorithms
ECCHash functions
SHA-2Libraries
v1.02.013CPLC
IC Fabricator, IC TypeVendor
Infineon, Infineon Technologies AG, Idemia, IDEMIASecurity level
EAL 5, EAL2, EAL5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP- 0059-2009-MA-01, BSI-CC-PP- 0071-2012, BSI-CC-PP- 0072-2012, BSI-CC-PP- 0076-2013, PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-, PP-SSCD-Part5, PP-SSCD-Part6Certificates
ANSSI-CC-2018/22, ANSSI-CC-2017/59, ANSSI-CC-2016/70Evaluation facilities
CESTI, CEA - LETIStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
Keywords | ANSSI-CC-CER-F-07.026 |
---|---|
Creation date | D:20180713115402+02'00' |
Modification date | D:20180713145243+02'00' |
Pages | 18 |
Creator | Acrobat PDFMaker 11 pour Word |
Producer | Adobe PDF Library 11.0 |
Frontpage
Certificate ID | ANSSI-CC-2018/22 |
---|---|
Certified item | IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application |
Certification lab | CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France |
Developer | Idemia 8 ChaussĂ©e Jules CĂ©sar, 95520 Osny, France Infineon Technologies AG AIM CC SM PS â Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Idemia 18 ChaussĂ©e Jules CĂ©sar, 95520 Osny, France |
References
Outgoing- ANSSI-CC-2016/70 - archived - ID.me 1.28 on IDeal Citiz MOSID V2.1.1
- ANSSI-CC-2017/59 - archived - IDeal Citiz v2.15-i on Infineon M7892 B11 Java Card Open Platform
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, 3DES, CMACAsymmetric Algorithms
RSA-PSS, RSA-OAEP, ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-384, SHA-512, SHA-256, SHA-2Schemes
MAC, Key agreementProtocols
PACERandomness
RNGLibraries
v1.02.013Block cipher modes
CBCVendor
Infineon, IDEMIASecurity level
EAL 5+, EAL 6+, EAL5, EAL6, EAL6+, EAL 5, EAL5+, EAL4+, EAL5 augmented, EAL6 augmented, EAL 5 augmentedClaims
D.SCD, D.SVD, O.SID, O.FIREWALL, O.GLOBAL_ARRAYS_CONFID, O.GLOBAL_ARRAYS_INTEG, O.NATIVE, O.OPERATE, O.REALLOCATION, O.RESOURCES, O.ALARM, O.CIPHER, O.KEY-MNGT, O.PIN-MNGT, O.BIO-MNGT, O.TRANSACTION, O.OBJ-DELETION, O.DELETION, O.LOAD, O.INSTALL, O.SCP, O.CARD-MANAGEMENT, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.APP_DATA_INTEGRITY, T.UNAUTH_CARD_MNGT, T.LIFE_CYCLE, T.UNAUTH_ACCESS, A.CSP, A.CGA, A.SCA, A.APPLET, A.VERIFICATION, A.PRODUCTION, OE.HI_VAD, OE.HID_VAD, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.SECURITY-DOMAINS, OE.QUOTAS, OE.SHARE-CONTROL, OE.KEY_GENERATION, OE.PRODUCTION, OSP.VERIFICATION, OSP.SECURITY_DOMAINS, OSP.QUOTAS, OSP.KEY_GENERATION, OSP.SHARE-CONTROLSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_PRE, AGD_OPE, AGD_USR, AGD_ADM, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.5, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_GEN, FCO_NRO, FCS_RND, FCS_RND.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FCS_CKM.3, FCS_CKM, FCS_COP, FCS_RND.1.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_UIT, FDP_DAU, FDP_ACC, FDP_ACF, FDP_RIP.1, FDP_SDI, FDP_ITC, FDP_UCT, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_SDI.2, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1.1, FDP_ITC.1, FDP_UCT.1, FDP_DAU.2, FDP_UIT.1, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_ATD, FIA_UID, FIA_USB, FIA_API.1.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1.1, FIA_AFL.1.2, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MSA.4, FMT_MTD, FMT_SMF, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4.1, FMT_MTD.1, FPR_UNO.1, FPT_EMS, FPT_EMS.1, FPT_FLS.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_FLS, FPT_TDC.1, FPT_RCV, FPT_PHP, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1.1, FPT_TST, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1, FTP_TRP.1Protection profiles
BSI-CC-PP-0068-V2-, BSI-PP-0035, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP-0071-2012, BSI-CC-PP-0072-2012, BSI-CC-PP-0076-2013, ANSSI-CC-PP-, PP-SSCD2, PP-SSCD3, PP-SSCD4, PP-SSCD5, PP-SSCD6, PP-SSCDCertificates
BSI-DSZ-CC-0782-V2-2015-RA-01, ANSSI-CC-2017/59Evaluation facilities
CEA-LETISide-channel analysis
physical probing, side channel, DPA, SPA, timing attacks, physical tampering, malfunction, DFA, fault injectionCertification process
out of scope, only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation, pre- personalization phase. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDealCitiz v2.1.1 Platform enforces separation of the data between the applets and, v2.1.1 mechanisms FCS_CKM.1 FCS_CKM.1 (only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation) The requirement in this ST is equiva- lent to parts of the platform STStandards
FIPS PUB 180-2, NIST SP 800-38B, PKCS3, PKCS#1, PKCS1, AIS20, AIS 20, AIS31, ISO/IEC 7816-4, ISO/IEC 14443, ISO/IEC 9797-, ISO/IEC 9797-1, ISO/IEC 15408:2005, ICAO, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004, CCMB-2017-04-001File metadata
Creation date | D:20171013152111+02'00' |
---|---|
Modification date | D:20180713145229+02'00' |
Pages | 124 |
Creator | MicrosoftÂź Word 2013 |
Producer | MicrosoftÂź Word 2013 |
References
Outgoing- ANSSI-CC-2017/59 - archived - IDeal Citiz v2.15-i on Infineon M7892 B11 Java Card Open Platform
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2Similar certificates
Name | Certificate ID | |
---|---|---|
IDEAL CITIZ V2.17-I on Infineon M7892 B11 embedding ID.me 1.6-i application | ANSSI-CC-2018/44-S01 | Compare |
IDeal Citiz v2.15-i on Infineon M7892 B11 embedding MICAO BAC 1.3.69 application | ANSSI-CC-2017/65 | Compare |
IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0) | ANSSI-CC-2019/32 | Compare |
Scheme data ?
Product | IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/ideal-citiz-v215i-infineon-m7892-b11-embedding-idme-148b-application | |
Description | Le produit certifiĂ© est « IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application » dĂ©veloppĂ© par IDEMIA et INFINEON TECHNOLOGIES AG. Ce produit est une carte Ă puce constituĂ©e dâun logiciel conforme au standard IAS ECC v1.0.1. Ce produit est destinĂ© Ă ĂȘtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD1). Il peut ĂȘtre utilisĂ© dans diffĂ©rents types de docum | |
Sponsor | Idemia | |
Developer | Idemia, Infineon Technologies AG | |
Cert Id | ANSSI-CC-2018/22 | |
Level | EAL5+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2018/22 | |
Certification Date | 09.07.2018 | |
Category | Cartes Ă puce | |
Cc Version | CritĂšres Communs version 3.1r5 | |
Developer | Idemia, Infineon Technologies AG | |
Sponsor | Idemia | |
Evaluation Facility | CEA - LETI | |
Level | EAL5+ | |
Protection Profile | ||
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Report Link | https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_22fr.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_22en.pdf |
References ?
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'description': 'Le produit certifiĂ© est « IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application » dĂ©veloppĂ© par IDEMIA et INFINEON TECHNOLOGIES AG. Ce produit est une carte Ă puce constituĂ©e dâun logiciel conforme au standard IAS ECC v1.0.1. Ce produit est destinĂ© Ă ĂȘtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD1). Il peut ĂȘtre utilisĂ© dans diffĂ©rents types de docum', 'cert_id': 'ANSSI-CC-2018/22', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2018/22', 'certification_date': '2018-07-09', 'mutual_recognition': 'SOG-IS CCRA'}}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v215i-infineon-m7892-b11-embedding-idme-148b-application', 'description': 'Le produit certifiĂ© est « IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application » dĂ©veloppĂ© par IDEMIA et INFINEON TECHNOLOGIES AG.\n\nCe produit est une carte Ă puce constituĂ©e dâun logiciel conforme au standard IAS ECC v1.0.1. Ce produit est destinĂ© Ă ĂȘtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD1). Il peut ĂȘtre utilisĂ© dans diffĂ©rents types de docum', 'sponsor': 'Idemia', 'developer': 'Idemia, Infineon Technologies AG', 'cert_id': '2018/22', 'level': 'EAL5+', 'enhanced': {'cert_id': '2018/22', 'certification_date': '09/07/2018', 'category': 'Cartes Ă puce', 'cc_version': 'CritĂšres Communs version 3.1r5', 'developer': 'Idemia, Infineon Technologies AG', 'sponsor': 'Idemia', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_22fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_22en.pdf'}}
.
- The scheme_data property was set to
-
02.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5c3b6c48be363bf1196a0ee3f8cec62c5f05612b0b7df84de74e3891ac0be65f', 'txt_hash': 'bfcc7ee8068e63e79911434bb7ad2a93dc594fef76a14966ac314e45fb793574'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '82bcb1dbd3b194c97b23cc09803becbf87884f94a047c5799c9729e753f2dead', 'txt_hash': '62a1969742ba1a7fde0d80e3141e3998c41e7efed436dbe969739a6276eb6dcf'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 287772, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Category': 'Référence, Version', '/Comments': 'Idemia', '/Company': 'SGDSN/ANSSI', '/CreationDate': "D:20180713115402+02'00'", '/Creator': 'Acrobat PDFMaker 11 pour Word', '/Keywords': 'ANSSI-CC-CER-F-07.026', '/ModDate': "D:20180713145243+02'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20180713095351', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 2578944, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 124, '/CreationDate': "D:20171013152111+02'00'", '/Creator': 'MicrosoftÂź Word 2013', '/ModDate': "D:20180713145229+02'00'", '/Producer': 'MicrosoftÂź Word 2013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok114', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok232', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok236', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok122', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok149', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok155', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok115', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok164', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok125', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok130', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok113', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok157', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok121', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok116', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok141', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok124', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok156', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok119', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok147', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok134', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok169', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok234', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok132', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok144', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok170', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok160', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok140', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok136', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok167', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok162', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok120', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok135', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok126', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok131', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok231', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok123', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok137', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok128', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok233', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok146', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok154', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok235', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok148', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok117', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok152', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok127', 'file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok138']}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['RĂ©fĂ©rence du rapport de certification(.+)Nom du produit(.+)RĂ©fĂ©rence/version du produit(.*)ConformitĂ© Ă un profil de protection(.+)CritĂšres dâĂ©valuation et version(.+)Niveau dâĂ©valuation(.+)DĂ©veloppeurs(.+)Centre dâĂ©valuation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2018/22', 'cert_item': 'IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application', 'cert_item_version': 'OFFICIEL_IDME_1_4_8B_IDealCitiz_SLE78CLFX4000PM_2_1_5_0_R2', 'ref_protection_profiles': 'Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1 ; Part 3: Device with key import, v1.0.2 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4', 'cc_version': 'CritĂšres Communs version 3.1 rĂ©vision 5', 'cc_security_level': 'EAL 5 augmentĂ© ALC_DVS.2, AVA_VAN.5', 'developer': 'Idemia 8 ChaussĂ©e Jules CĂ©sar, 95520 Osny, France Infineon Technologies AG AIM CC SM PS â Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Idemia 18 ChaussĂ©e Jules CĂ©sar, 95520 Osny, France', 'cert_lab': 'CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'FR': {'ANSSI-CC-2018/22': 19, 'ANSSI-CC-2017/59': 1, 'ANSSI-CC-2016/70': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP- 0059-2009-MA-01': 1, 'BSI-CC-PP- 0071-2012': 1, 'BSI-CC-PP- 0072-2012': 1, 'BSI-CC-PP- 0076-2013': 1}, 'other': {'PP-SSCD-Part2': 1, 'PP-SSCD-Part3': 1, 'PP-SSCD-': 6, 'PP-SSCD-Part5': 1, 'PP-SSCD-Part6': 1}}, 'cc_security_level': {'EAL': {'EAL 5': 3, 'EAL2': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_PRE': 3, 'AGD_OPE': 2}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 6, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 24, 'Infineon Technologies AG': 1}, 'Idemia': {'Idemia': 2, 'IDEMIA': 19}}, 'eval_facility': {'CESTI': {'CESTI': 3}, 'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-2': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 4}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICFab': {'IC Fabricator': 1}, 'ICType': {'IC Type': 1}}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0782-V2-2015-RA-01': 2}, 'FR': {'ANSSI-CC-2017/59': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0068-V2-': 1, 'BSI-PP-0035': 2, 'BSI-CC-PP-0059-2009-MA-01': 1, 'BSI-CC-PP-0075-2012': 1, 'BSI-CC-PP-0071-2012': 1, 'BSI-CC-PP-0072-2012': 1, 'BSI-CC-PP-0076-2013': 1}, 'ANSSI': {'ANSSI-CC-PP-': 1}, 'other': {'PP-SSCD2': 23, 'PP-SSCD3': 17, 'PP-SSCD4': 16, 'PP-SSCD5': 20, 'PP-SSCD6': 16, 'PP-SSCD': 1}}, 'cc_security_level': {'EAL': {'EAL 5+': 1, 'EAL 6+': 1, 'EAL5': 5, 'EAL6': 1, 'EAL6+': 1, 'EAL 5': 1, 'EAL5+': 3, 'EAL4+': 1, 'EAL5 augmented': 5, 'EAL6 augmented': 1, 'EAL 5 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 6, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.5': 8, 'ADV_TDS.4': 8, 'ADV_IMP.1': 8, 'ADV_TDS.3': 3, 'ADV_INT.2': 1, 'ADV_FSP.2': 2, 'ADV_FSP.4': 1}, 'AGD': {'AGD_PRE': 6, 'AGD_OPE': 4, 'AGD_USR': 1, 'AGD_ADM': 1, 'AGD_OPE.1': 5, 'AGD_PRE.1': 5}, 'ALC': {'ALC_DVS.2': 8, 'ALC_TAT.1': 2, 'ALC_TAT.2': 3, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 3, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 6, 'ATE_COV.1': 2, 'ATE_DPT.1': 1, 'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN.5': 8}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 5, 'ASE_REQ.1': 2, 'ASE_REQ.2': 2, 'ASE_OBJ.2': 3, 'ASE_SPD.1': 2, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 1, 'FAU_GEN': 1}, 'FCO': {'FCO_NRO': 1}, 'FCS': {'FCS_RND': 5, 'FCS_RND.1': 12, 'FCS_CKM.1': 21, 'FCS_CKM.4': 15, 'FCS_COP.1': 15, 'FCS_CKM.2': 2, 'FCS_CKM.3': 1, 'FCS_CKM': 2, 'FCS_COP': 1, 'FCS_RND.1.1': 2, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_UIT': 12, 'FDP_DAU': 11, 'FDP_ACC': 65, 'FDP_ACF': 55, 'FDP_RIP.1': 12, 'FDP_SDI': 24, 'FDP_ITC': 13, 'FDP_UCT': 17, 'FDP_IFC': 2, 'FDP_IFF': 2, 'FDP_RIP': 8, 'FDP_ROL': 1, 'FDP_SDI.2': 5, 'FDP_ACC.1': 15, 'FDP_ACF.1': 20, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 5, 'FDP_UCT.1': 1, 'FDP_DAU.2': 2, 'FDP_UIT.1': 2, 'FDP_ITC.2': 2, 'FDP_IFC.1': 7}, 'FIA': {'FIA_API': 5, 'FIA_API.1': 12, 'FIA_UAU.1': 23, 'FIA_UID.1': 21, 'FIA_AFL.1': 10, 'FIA_ATD': 1, 'FIA_UID': 2, 'FIA_USB': 1, 'FIA_API.1.1': 2, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_SMR.1': 27, 'FMT_SMF.1': 24, 'FMT_MOF.1': 12, 'FMT_MSA': 37, 'FMT_MSA.2': 14, 'FMT_MSA.3': 24, 'FMT_MSA.4': 16, 'FMT_MTD': 26, 'FMT_SMF': 2, 'FMT_SMR': 3, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 4, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4.1': 1, 'FMT_MTD.1': 2}, 'FPR': {'FPR_UNO.1': 1}, 'FPT': {'FPT_EMS': 5, 'FPT_EMS.1': 15, 'FPT_FLS.1': 13, 'FPT_PHP.1': 9, 'FPT_PHP.3': 13, 'FPT_TST.1': 15, 'FPT_FLS': 3, 'FPT_TDC.1': 1, 'FPT_RCV': 3, 'FPT_PHP': 1, 'FPT_EMS.1.1': 4, 'FPT_EMS.1.2': 3, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC': 65, 'FTP_ITC.1': 14, 'FTP_TRP.1': 2}}, 'cc_claims': {'D': {'D.SCD': 1, 'D.SVD': 1}, 'O': {'O.SID': 1, 'O.FIREWALL': 1, 'O.GLOBAL_ARRAYS_CONFID': 1, 'O.GLOBAL_ARRAYS_INTEG': 1, 'O.NATIVE': 1, 'O.OPERATE': 1, 'O.REALLOCATION': 1, 'O.RESOURCES': 1, 'O.ALARM': 1, 'O.CIPHER': 1, 'O.KEY-MNGT': 1, 'O.PIN-MNGT': 1, 'O.BIO-MNGT': 1, 'O.TRANSACTION': 1, 'O.OBJ-DELETION': 1, 'O.DELETION': 1, 'O.LOAD': 1, 'O.INSTALL': 1, 'O.SCP': 3, 'O.CARD-MANAGEMENT': 1}, 'T': {'T.CONFID-APPLI-DATA': 1, 'T.CONFID-JCS-CODE': 1, 'T.CONFID-JCS-DATA': 1, 'T.INTEG-APPLI-CODE': 2, 'T.INTEG-APPLI-DATA': 2, 'T.INTEG-JCS-CODE': 1, 'T.INTEG-JCS-DATA': 1, 'T.SID': 2, 'T.EXE-CODE': 2, 'T.NATIVE': 1, 'T.RESOURCES': 1, 'T.DELETION': 1, 'T.INSTALL': 1, 'T.OBJ-DELETION': 1, 'T.PHYSICAL': 1, 'T.APP_DATA_INTEGRITY': 1, 'T.UNAUTH_CARD_MNGT': 1, 'T.LIFE_CYCLE': 1, 'T.UNAUTH_ACCESS': 1}, 'A': {'A.CSP': 9, 'A.CGA': 6, 'A.SCA': 5, 'A.APPLET': 1, 'A.VERIFICATION': 1, 'A.PRODUCTION': 1}, 'OE': {'OE.HI_VAD': 2, 'OE.HID_VAD': 5, 'OE.APPLET': 1, 'OE.VERIFICATION': 1, 'OE.CODE-EVIDENCE': 1, 'OE.SECURITY-DOMAINS': 1, 'OE.QUOTAS': 1, 'OE.SHARE-CONTROL': 1, 'OE.KEY_GENERATION': 1, 'OE.PRODUCTION': 1}, 'OSP': {'OSP.VERIFICATION': 1, 'OSP.SECURITY_DOMAINS': 1, 'OSP.QUOTAS': 1, 'OSP.KEY_GENERATION': 1, 'OSP.SHARE-CONTROL': 1}}, 'vendor': {'Infineon': {'Infineon': 13}, 'Idemia': {'IDEMIA': 8}}, 'eval_facility': {'CEA-LETI': {'CEA-LETI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 13}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 5, '3DES': 6}}, 'constructions': {'MAC': {'CMAC': 3}}}, 'asymmetric_crypto': {'RSA': {'RSA-PSS': 1, 'RSA-OAEP': 1}, 'ECC': {'ECDH': {'ECDH': 3}, 'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 12}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8}, 'SHA2': {'SHA-224': 2, 'SHA-384': 3, 'SHA-512': 6, 'SHA-256': 7, 'SHA-2': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 6}, 'KA': {'Key agreement': 1}}, 'crypto_protocol': {'PACE': {'PACE': 26}}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 5}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Infineon': {'v1.02.013': 6}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'side channel': 1, 'DPA': 3, 'SPA': 3, 'timing attacks': 2}, 'FI': {'physical tampering': 7, 'malfunction': 1, 'DFA': 1, 'fault injection': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-2': 2}, 'NIST': {'NIST SP 800-38B': 1}, 'PKCS': {'PKCS3': 1, 'PKCS#1': 3, 'PKCS1': 3}, 'BSI': {'AIS20': 1, 'AIS 20': 1, 'AIS31': 2}, 'ISO': {'ISO/IEC 7816-4': 1, 'ISO/IEC 14443': 2, 'ISO/IEC 9797-': 1, 'ISO/IEC 9797-1': 2, 'ISO/IEC 15408:2005': 2}, 'ICAO': {'ICAO': 7}, 'CC': {'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2, 'CCMB-2017-04-001': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation': 1, 'pre- personalization phase. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDealCitiz v2.1.1 Platform enforces separation of the data between the applets and': 1, 'v2.1.1 mechanisms FCS_CKM.1 FCS_CKM.1 (only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation) The requirement in this ST is equiva- lent to parts of the platform ST': 1}}}
. - The report_filename property was set to
anssi-cc-2018_22fr.pdf
. - The st_filename property was set to
anssi-cible-cc-2018_22en.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['CEA']
. - The cert_id property was set to
ANSSI-CC-2018/22
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/59']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/59']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/70', 'ANSSI-CC-2017/59']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0782-2012', 'BSI-DSZ-CC-0782-V2-2015', 'ANSSI-CC-2016/66', 'ANSSI-CC-2017/59', 'ANSSI-CC-2016/70', 'BSI-DSZ-CC-0879-2014', 'BSI-DSZ-CC-0879-V2-2015', 'ANSSI-CC-2016/67']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_22fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_22en.pdf
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values discarded. - The scheme_data property was set to
{'product': 'IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application', 'url': 'https://cyber.gouv.fr/produits-certifies/ideal-citiz-v215i-infineon-m7892-b11-embedding-idme-148b-application', 'description': 'Le produit certifiĂ© est « IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application » dĂ©veloppĂ© par IDEMIA et INFINEON TECHNOLOGIES AG.\n\nCe produit est une carte Ă puce constituĂ©e dâun logiciel conforme au standard IAS ECC v1.0.1. Ce produit est destinĂ© Ă ĂȘtre utilisĂ© comme dispositif sĂ©curisĂ© de crĂ©ation de signature (SSCD1). Il peut ĂȘtre utilisĂ© dans diffĂ©rents types de docum', 'sponsor': 'Idemia', 'developer': 'Idemia, Infineon Technologies AG', 'cert_id': '2018/22', 'level': 'EAL5+', 'enhanced': {'cert_id': '2018/22', 'certification_date': '09/07/2018', 'category': 'Cartes Ă puce', 'cc_version': 'CritĂšres Communs version 3.1r5', 'developer': 'Idemia, Infineon Technologies AG', 'sponsor': 'Idemia', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS\n CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_22fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_22en.pdf'}}
.
- The report property was updated, with the
-
31.07.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "2c0fa55136a3d581",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2018/22",
"cert_lab": [
"CEA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.4.8",
"2.15"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/59",
"ANSSI-CC-2016/70"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/59",
"BSI-DSZ-CC-0782-V2-2015",
"BSI-DSZ-CC-0879-2014",
"BSI-DSZ-CC-0782-2012",
"ANSSI-CC-2016/66",
"ANSSI-CC-2016/67",
"BSI-DSZ-CC-0879-V2-2015",
"ANSSI-CC-2016/70"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2018/22",
"description": "Le produit certifi\u00e9 est \u00ab IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application \u00bb d\u00e9velopp\u00e9 par IDEMIA et INFINEON TECHNOLOGIES AG. Ce produit est une carte \u00e0 puce constitu\u00e9e d\u2019un logiciel conforme au standard IAS ECC v1.0.1. Ce produit est destin\u00e9 \u00e0 \u00eatre utilis\u00e9 comme dispositif s\u00e9curis\u00e9 de cr\u00e9ation de signature (SSCD1). Il peut \u00eatre utilis\u00e9 dans diff\u00e9rents types de docum",
"developer": "Idemia, Infineon Technologies AG",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r5",
"cert_id": "ANSSI-CC-2018/22",
"certification_date": "2018-07-09",
"developer": "Idemia, Infineon Technologies AG",
"evaluation_facility": "CEA - LETI",
"level": "EAL5+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "",
"report_link": "https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cc-2018_22fr.pdf",
"sponsor": "Idemia",
"target_link": "https://cyber.gouv.fr/sites/default/files/2018/07/anssi-cible-cc-2018_22en.pdf"
},
"level": "EAL5+",
"product": "IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application",
"sponsor": "Idemia",
"url": "https://cyber.gouv.fr/produits-certifies/ideal-citiz-v215i-infineon-m7892-b11-embedding-idme-148b-application"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/59"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/59"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Idemia",
"manufacturer_web": "https://www.idemia.com",
"name": "IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application",
"not_valid_after": "2023-07-09",
"not_valid_before": "2018-07-09",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "anssi-cc-2018_22fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL 5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 5",
"cert_id": "ANSSI-CC-2018/22",
"cert_item": "IDeal Citiz v2.15i on Infineon M7892 B11 embedding ID.me 1.4.8B Application",
"cert_item_version": "OFFICIEL_IDME_1_4_8B_IDealCitiz_SLE78CLFX4000PM_2_1_5_0_R2",
"cert_lab": "CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France",
"developer": "Idemia 8 Chauss\u00e9e Jules C\u00e9sar, 95520 Osny, France Infineon Technologies AG AIM CC SM PS \u2013 Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Idemia 18 Chauss\u00e9e Jules C\u00e9sar, 95520 Osny, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1 ; Part 3: Device with key import, v1.0.2 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4"
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2016/70": 1,
"ANSSI-CC-2017/59": 1,
"ANSSI-CC-2018/22": 19
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0059-2009-MA-01": 1,
"BSI-CC-PP- 0071-2012": 1,
"BSI-CC-PP- 0072-2012": 1,
"BSI-CC-PP- 0076-2013": 1
},
"other": {
"PP-SSCD-": 6,
"PP-SSCD-Part2": 1,
"PP-SSCD-Part3": 1,
"PP-SSCD-Part5": 1,
"PP-SSCD-Part6": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_PRE": 3
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 3,
"EAL 7": 1,
"EAL2": 2,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {
"ICFab": {
"IC Fabricator": 1
},
"ICType": {
"IC Type": 1
}
},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 4
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1
},
"CESTI": {
"CESTI": 3
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-2": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 19,
"Idemia": 2
},
"Infineon": {
"Infineon": 24,
"Infineon Technologies AG": 1
}
},
"vulnerability": {}
},
"report_metadata": {
"/Category": "R\u00e9f\u00e9rence, Version",
"/Comments": "Idemia",
"/Company": "SGDSN/ANSSI",
"/CreationDate": "D:20180713115402+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 pour Word",
"/Keywords": "ANSSI-CC-CER-F-07.026",
"/ModDate": "D:20180713145243+02\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20180713095351",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 287772,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ssi.gouv.fr/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "anssi-cible-cc-2018_22en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 12
},
"ECDH": {
"ECDH": 3
},
"ECDSA": {
"ECDSA": 3
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
},
"RSA": {
"RSA-OAEP": 1,
"RSA-PSS": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0782-V2-2015-RA-01": 2
},
"FR": {
"ANSSI-CC-2017/59": 1
}
},
"cc_claims": {
"A": {
"A.APPLET": 1,
"A.CGA": 6,
"A.CSP": 9,
"A.PRODUCTION": 1,
"A.SCA": 5,
"A.VERIFICATION": 1
},
"D": {
"D.SCD": 1,
"D.SVD": 1
},
"O": {
"O.ALARM": 1,
"O.BIO-MNGT": 1,
"O.CARD-MANAGEMENT": 1,
"O.CIPHER": 1,
"O.DELETION": 1,
"O.FIREWALL": 1,
"O.GLOBAL_ARRAYS_CONFID": 1,
"O.GLOBAL_ARRAYS_INTEG": 1,
"O.INSTALL": 1,
"O.KEY-MNGT": 1,
"O.LOAD": 1,
"O.NATIVE": 1,
"O.OBJ-DELETION": 1,
"O.OPERATE": 1,
"O.PIN-MNGT": 1,
"O.REALLOCATION": 1,
"O.RESOURCES": 1,
"O.SCP": 3,
"O.SID": 1,
"O.TRANSACTION": 1
},
"OE": {
"OE.APPLET": 1,
"OE.CODE-EVIDENCE": 1,
"OE.HID_VAD": 5,
"OE.HI_VAD": 2,
"OE.KEY_GENERATION": 1,
"OE.PRODUCTION": 1,
"OE.QUOTAS": 1,
"OE.SECURITY-DOMAINS": 1,
"OE.SHARE-CONTROL": 1,
"OE.VERIFICATION": 1
},
"OSP": {
"OSP.KEY_GENERATION": 1,
"OSP.QUOTAS": 1,
"OSP.SECURITY_DOMAINS": 1,
"OSP.SHARE-CONTROL": 1,
"OSP.VERIFICATION": 1
},
"T": {
"T.APP_DATA_INTEGRITY": 1,
"T.CONFID-APPLI-DATA": 1,
"T.CONFID-JCS-CODE": 1,
"T.CONFID-JCS-DATA": 1,
"T.DELETION": 1,
"T.EXE-CODE": 2,
"T.INSTALL": 1,
"T.INTEG-APPLI-CODE": 2,
"T.INTEG-APPLI-DATA": 2,
"T.INTEG-JCS-CODE": 1,
"T.INTEG-JCS-DATA": 1,
"T.LIFE_CYCLE": 1,
"T.NATIVE": 1,
"T.OBJ-DELETION": 1,
"T.PHYSICAL": 1,
"T.RESOURCES": 1,
"T.SID": 2,
"T.UNAUTH_ACCESS": 1,
"T.UNAUTH_CARD_MNGT": 1
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-": 1
},
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0068-V2-": 1,
"BSI-CC-PP-0071-2012": 1,
"BSI-CC-PP-0072-2012": 1,
"BSI-CC-PP-0075-2012": 1,
"BSI-CC-PP-0076-2013": 1,
"BSI-PP-0035": 2
},
"other": {
"PP-SSCD": 1,
"PP-SSCD2": 23,
"PP-SSCD3": 17,
"PP-SSCD4": 16,
"PP-SSCD5": 20,
"PP-SSCD6": 16
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 6,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 1,
"ADV_FSP.5": 8,
"ADV_IMP.1": 8,
"ADV_INT.2": 1,
"ADV_TDS.1": 2,
"ADV_TDS.3": 3,
"ADV_TDS.4": 8
},
"AGD": {
"AGD_ADM": 1,
"AGD_OPE": 4,
"AGD_OPE.1": 5,
"AGD_PRE": 6,
"AGD_PRE.1": 5,
"AGD_USR": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.1": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 8,
"ALC_LCD.1": 3,
"ALC_TAT.1": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 4,
"ASE_INT.1": 5,
"ASE_OBJ.2": 3,
"ASE_REQ.1": 2,
"ASE_REQ.2": 2,
"ASE_SPD.1": 2,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 3,
"ATE_DPT.1": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 6
},
"AVA": {
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL 5 augmented": 1,
"EAL 5+": 1,
"EAL 6+": 1,
"EAL4+": 1,
"EAL5": 5,
"EAL5 augmented": 5,
"EAL5+": 3,
"EAL6": 1,
"EAL6 augmented": 1,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1,
"FAU_GEN": 1
},
"FCO": {
"FCO_NRO": 1
},
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.1": 21,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.3": 1,
"FCS_CKM.4": 15,
"FCS_CKM.4.1": 1,
"FCS_COP": 1,
"FCS_COP.1": 15,
"FCS_COP.1.1": 1,
"FCS_RND": 5,
"FCS_RND.1": 12,
"FCS_RND.1.1": 2
},
"FDP": {
"FDP_ACC": 65,
"FDP_ACC.1": 15,
"FDP_ACF": 55,
"FDP_ACF.1": 20,
"FDP_DAU": 11,
"FDP_DAU.2": 2,
"FDP_IFC": 2,
"FDP_IFC.1": 7,
"FDP_IFF": 2,
"FDP_ITC": 13,
"FDP_ITC.1": 5,
"FDP_ITC.2": 2,
"FDP_RIP": 8,
"FDP_RIP.1": 12,
"FDP_RIP.1.1": 1,
"FDP_ROL": 1,
"FDP_SDI": 24,
"FDP_SDI.2": 5,
"FDP_UCT": 17,
"FDP_UCT.1": 1,
"FDP_UIT": 12,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL.1": 10,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 5,
"FIA_API.1": 12,
"FIA_API.1.1": 2,
"FIA_ATD": 1,
"FIA_UAU.1": 23,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID": 2,
"FIA_UID.1": 21,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB": 1
},
"FMT": {
"FMT_MOF.1": 12,
"FMT_MOF.1.1": 1,
"FMT_MSA": 37,
"FMT_MSA.1": 4,
"FMT_MSA.2": 14,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 24,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 16,
"FMT_MSA.4.1": 1,
"FMT_MTD": 26,
"FMT_MTD.1": 2,
"FMT_SMF": 2,
"FMT_SMF.1": 24,
"FMT_SMF.1.1": 1,
"FMT_SMR": 3,
"FMT_SMR.1": 27,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 1
},
"FPT": {
"FPT_EMS": 5,
"FPT_EMS.1": 15,
"FPT_EMS.1.1": 4,
"FPT_EMS.1.2": 3,
"FPT_FLS": 3,
"FPT_FLS.1": 13,
"FPT_FLS.1.1": 1,
"FPT_PHP": 1,
"FPT_PHP.1": 9,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 13,
"FPT_PHP.3.1": 1,
"FPT_RCV": 3,
"FPT_TDC.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 15,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 65,
"FTP_ITC.1": 14,
"FTP_TRP.1": 2
}
},
"certification_process": {
"OutOfScope": {
"only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation": 1,
"out of scope": 2,
"pre- personalization phase. Beside the TOE, the product can include other Java Card applications (out of scope of the TOE). IDealCitiz v2.1.1 Platform enforces separation of the data between the applets and": 1,
"v2.1.1 mechanisms FCS_CKM.1 FCS_CKM.1 (only EC is used to generate keys, the RSA key generation is out of scope of the platform evaluation) The requirement in this ST is equiva- lent to parts of the platform ST": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"Infineon": {
"v1.02.013": 6
}
},
"crypto_protocol": {
"PACE": {
"PACE": 26
}
},
"crypto_scheme": {
"KA": {
"Key agreement": 1
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA-LETI": 1
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-2": 1,
"SHA-224": 2,
"SHA-256": 7,
"SHA-384": 3,
"SHA-512": 6
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"fault injection": 1,
"malfunction": 1,
"physical tampering": 7
},
"SCA": {
"DPA": 3,
"SPA": 3,
"physical probing": 2,
"side channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS20": 1,
"AIS31": 2
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 2,
"CCMB-2017-04-003": 2,
"CCMB-2017-04-004": 2
},
"FIPS": {
"FIPS PUB 180-2": 2
},
"ICAO": {
"ICAO": 7
},
"ISO": {
"ISO/IEC 14443": 2,
"ISO/IEC 15408:2005": 2,
"ISO/IEC 7816-4": 1,
"ISO/IEC 9797-": 1,
"ISO/IEC 9797-1": 2
},
"NIST": {
"NIST SP 800-38B": 1
},
"PKCS": {
"PKCS#1": 3,
"PKCS1": 3,
"PKCS3": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 13
}
},
"DES": {
"3DES": {
"3DES": 6,
"TDES": 5
},
"DES": {
"DES": 1
}
},
"constructions": {
"MAC": {
"CMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 8
},
"Infineon": {
"Infineon": 13
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20171013152111+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/ModDate": "D:20180713145229+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"pdf_file_size_bytes": 2578944,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok154",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok149",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok141",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok120",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok137",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok134",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok162",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok127",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok121",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok117",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok146",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok131",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok232",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok234",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok126",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok164",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok125",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok132",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok170",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok119",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok122",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok152",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok157",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok116",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok233",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok130",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok140",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok135",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok160",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok156",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok123",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok167",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok235",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok231",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok169",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok148",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok144",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok236",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok113",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok136",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok114",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok138",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok128",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok147",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok115",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok124",
"file:///C:/Users/GT903013/Desktop/finalDoc.doc%23tok155"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 124
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_22fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"ALC_DVS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_22en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5c3b6c48be363bf1196a0ee3f8cec62c5f05612b0b7df84de74e3891ac0be65f",
"txt_hash": "bfcc7ee8068e63e79911434bb7ad2a93dc594fef76a14966ac314e45fb793574"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "82bcb1dbd3b194c97b23cc09803becbf87884f94a047c5799c9729e753f2dead",
"txt_hash": "62a1969742ba1a7fde0d80e3141e3998c41e7efed436dbe969739a6276eb6dcf"
}
},
"status": "archived"
}