This page was not yet optimized for use on mobile
devices.
IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2
CSV information
| Status | archived |
|---|---|
| Valid from | 17.09.2019 |
| Valid until | 17.09.2024 |
| Scheme | 🇫🇷 FR |
| Manufacturer | Idemia |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ALC_DVS.2, EAL5+, AVA_VAN.5 |
| Protection profiles | |
| Maintenance updates | Reassessment report : ANSSI-CC-2019/34-S01 (17.11.2022) Certification report Security target |
Heuristics summary
Certificate ID: ANSSI-CC-2019/34
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
DESAsymmetric Algorithms
ECCVendor
NXP Semiconductors, NXP, Idemia, IDEMIASecurity level
EAL 5, EAL2, EAL7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_INT, ADV_SPM, ADV_TDS, ADV_PRE, ADV_OPE, AGD_PRE, AGD_OPE, AGD_QUA, AGD_PPRE, AGD_POPE, AGD_PDEV, AGD_PALP, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_GMS, ALC_DEL, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075-2012, BSI-CC-PP- 0059-2009-MA-01, BSI-CC-PP- 0075-2012, BSI-PP-0084-2014, PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Certificates
BSI-DSZ-CC-1059-2018, ANSSI-CC-2019/34, ANSSI-CC-2019/28Evaluation facilities
SERMA, CESTI, CEA - LETIStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004File metadata
| Title | Microsoft Word - ANSSI-CC-2019_34fr.docx |
|---|---|
| Author | chuzel |
| Creation date | D:20190925140644+02'00' |
| Modification date | D:20190925140644+02'00' |
| Pages | 17 |
| Creator | PScript5.dll Version 5.2.2 |
| Producer | Acrobat Distiller 11.0 (Windows) |
References
Outgoing- ANSSI-CC-2019/28 - active - Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 Identification du matériel 091121
- BSI-DSZ-CC-1059-2018 - archived - NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software
- ANSSI-CC-2020/51 - archived - IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2
- ANSSI-CC-2019/43 - archived - Application CPS2ter v1.12, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2 (Identification 01 12)
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, CMACAsymmetric Algorithms
ECDSA, ECC, DH, Diffie-Hellman, DSAHash functions
SHA-1, SHA-256, SHA-224, SHA-384Schemes
MACRandomness
RNGBlock cipher modes
CBCTrusted Execution Environments
SEVendor
NXP, Oberthur Technologies, IDEMIA, MorphoSecurity level
EAL5, EAL 5, EAL4, EAL5 augmented, EAL4 augmented, EAL 5 augmentedClaims
T.CONFID_APPLI_DATA, T.RESSOURCES, T.OBJ_DELETION, T.PHYSICAL, T.INTEG_APPLI_DATA, A.CGA, A.SCA, A.CSP, A.PLT, A.APPLET, A.VERIFICATION, OE.HID_VAD, OE.PLT, OE.VERIFICATION, OE.CODE_EVIDENCE, OE.APPLET, OE.CODE-EVIDENCE, OSP.PLT, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_TDS, ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_PRE, AGD_OPE, AGD_PRE_PLT, AGD_OPE.1, ALC_DVS.2, ALC_DVS, ALC_CMC, ALC_CMS, ALC_DEL, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_DPT.1, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_TSSSecurity Functional Requirements (SFR)
FAU_GEN, FAU_ARP.1, FCS_RNG, FCS_CKM.1, FCS_CKM, FCS_COP, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM.3, FDP_ACC, FDP_ACF, FDP_ETC, FDP_ITC, FDP_ITC.1, FDP_ITC.2, FDP_ACF.1, FDP_ACC.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FDP_IFC.1, FDP_UCT, FDP_UCT.1, FDP_ETC.1, FDP_CKM, FDP_CKM.1, FDP_RIP, FDP_ROL, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL, FIA_AFL.1.1, FMT_MSA, FMT_MTD, FMT_MSA.3, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD.1, FMT_MOF.1, FMT_MOF.1.1, FPR_UNO.1, FPR_UNO, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_FLS, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_RCV, FPT_PHP, FTP_ITC.1, FTP_TRP.1, FTP_ITCProtection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0059-2009-MA-01, BSI-CC-PP-0075Certificates
ANSSI-CC-2019/28Side-channel analysis
side channel, SPA, DPA, timing attacks, physical tampering, DFA, fault injection, JIL, JIL-COMPStandards
FIPS180-3, FIPS PUB 180-3, FIPS 180-3, PKCS#1, PKCS #1, PKCS#3, PKCS#15, ISO/IEC 9796-2, SCP03, SCP02File metadata
| Subject | FQR standard |
|---|---|
| Keywords | Quality |
| Author | IDEMIA |
| Creation date | D:20190802141816+02'00' |
| Modification date | D:20190802141816+02'00' |
| Pages | 89 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
References
Outgoing- ANSSI-CC-2019/28 - active - Plateforme ID-One Cosmo v8.2 masquée sur le composant NXP P60D145 Identification du matériel 091121
- ANSSI-CC-2019/43-R01 - active - Application CPS2ter, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2Code SAAAAR Applet : 0708312 ; Code SAAAAR Patch : 093072
- ANSSI-CC-2019/43 - archived - Application CPS2ter v1.12, adossée à l’application IAS ECC v1.3, en composition sur la plateforme ID-One Cosmo v8.2 (Identification 01 12)
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2019/34Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, ALC_DVS.2, ATE_DPT.1, AVA_VAN.5Similar certificates
Showing 5 out of 63.
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "38ceb95f1e9f2883",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2019/34",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL5+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"8.2",
"1.3"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"27abdb9c6ab375a7",
"d918b28fd7bb5d79"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/43",
"ANSSI-CC-2020/51"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/28",
"BSI-DSZ-CC-1059-2018"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2020/51",
"ANSSI-CC-2019/43"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0973-V2-2016",
"BSI-DSZ-CC-0973-2016",
"ANSSI-CC-2017/49",
"ANSSI-CC-2019/28",
"BSI-DSZ-CC-1059-2018"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/43-R01",
"ANSSI-CC-2019/43"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/28"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/43-R01",
"ANSSI-CC-2019/43"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/28"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2022-11-17",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_34-s01.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2019_34-s01.pdf",
"maintenance_title": "Reassessment report : ANSSI-CC-2019/34-S01"
}
]
},
"manufacturer": "Idemia",
"manufacturer_web": "https://www.idemia.com",
"name": "IAS ECC V2, version 1.3 en configuration #2 sur la plateforme ID-One Cosmo v8.2",
"not_valid_after": "2024-09-17",
"not_valid_before": "2019-09-17",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "anssi-cc-2019_34fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 27
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-1059-2018": 1
},
"FR": {
"ANSSI-CC-2019/28": 1,
"ANSSI-CC-2019/34": 17
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0059-2009-MA-01": 1,
"BSI-CC-PP- 0075-2012": 1,
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0075-2012": 1,
"BSI-PP-0084-2014": 1
},
"other": {
"PP-SSCD-": 2,
"PP-SSCD-Part2": 1,
"PP-SSCD-Part3": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_INT": 1,
"ADV_OPE": 1,
"ADV_PRE": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 3,
"AGD_PALP": 1,
"AGD_PDEV": 1,
"AGD_POPE": 1,
"AGD_PPRE": 1,
"AGD_PRE": 5,
"AGD_QUA": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_DEL": 1,
"ALC_DVS.2": 2,
"ALC_FLR": 2,
"ALC_GMS": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 2,
"EAL2": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1
},
"CESTI": {
"CESTI": 3
},
"Serma": {
"SERMA": 4
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 21,
"Idemia": 2
},
"NXP": {
"NXP": 8,
"NXP Semiconductors": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "chuzel",
"/CreationDate": "D:20190925140644+02\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20190925140644+02\u002700\u0027",
"/Producer": "Acrobat Distiller 11.0 (Windows)",
"/Title": "Microsoft Word - ANSSI-CC-2019_34fr.docx",
"pdf_file_size_bytes": 289674,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 17
},
"st_filename": "anssi-cible-cc-2019_34en.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 34
},
"ECDSA": {
"ECDSA": 2
}
},
"FF": {
"DH": {
"DH": 5,
"Diffie-Hellman": 1
},
"DSA": {
"DSA": 1
}
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2019/28": 1
}
},
"cc_claims": {
"A": {
"A.APPLET": 1,
"A.CGA": 4,
"A.CSP": 4,
"A.PLT": 2,
"A.SCA": 3,
"A.VERIFICATION": 1
},
"OE": {
"OE.APPLET": 1,
"OE.CODE-EVIDENCE": 1,
"OE.CODE_EVIDENCE": 2,
"OE.HID_VAD": 4,
"OE.PLT": 2,
"OE.VERIFICATION": 4
},
"OSP": {
"OSP.PLT": 1,
"OSP.VERIFICATION": 1
},
"T": {
"T.CONFID_APPLI_DATA": 3,
"T.INTEG_APPLI_DATA": 6,
"T.OBJ_DELETION": 3,
"T.PHYSICAL": 3,
"T.RESSOURCES": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-01": 1,
"BSI-CC-PP-0075": 1,
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.4": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 2,
"ADV_INT": 1,
"ADV_TDS": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE": 10,
"AGD_OPE.1": 2,
"AGD_PRE": 14,
"AGD_PRE_PLT": 2
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 2,
"ALC_DVS.2": 7,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_TSS": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 2,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 2,
"EAL 5 augmented": 1,
"EAL4": 1,
"EAL4 augmented": 1,
"EAL5": 6,
"EAL5 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 2,
"FAU_GEN": 1
},
"FCS": {
"FCS_CKM": 34,
"FCS_CKM.1": 41,
"FCS_CKM.2": 8,
"FCS_CKM.3": 5,
"FCS_CKM.4": 60,
"FCS_CKM.4.1": 1,
"FCS_COP": 105,
"FCS_COP.1": 38,
"FCS_COP.1.1": 3,
"FCS_RNG": 4,
"FCS_RNG.1": 19,
"FCS_RNG.1.1": 3,
"FCS_RNG.1.2": 3
},
"FDP": {
"FDP_ACC": 69,
"FDP_ACC.1": 38,
"FDP_ACF": 48,
"FDP_ACF.1": 36,
"FDP_CKM": 4,
"FDP_CKM.1": 1,
"FDP_ETC": 5,
"FDP_ETC.1": 2,
"FDP_IFC.1": 20,
"FDP_ITC": 21,
"FDP_ITC.1": 42,
"FDP_ITC.2": 35,
"FDP_RIP": 11,
"FDP_RIP.1": 10,
"FDP_RIP.1.1": 3,
"FDP_ROL": 1,
"FDP_SDI": 15,
"FDP_SDI.1": 2,
"FDP_SDI.2": 6,
"FDP_UCT": 7,
"FDP_UCT.1": 1
},
"FIA": {
"FIA_AFL": 22,
"FIA_AFL.1": 3,
"FIA_AFL.1.1": 1,
"FIA_UAU.1": 14,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 15,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MSA": 31,
"FMT_MSA.1": 7,
"FMT_MSA.2": 9,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 31,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 8,
"FMT_MSA.4.1": 1,
"FMT_MTD": 39,
"FMT_MTD.1": 6,
"FMT_SMF.1": 44,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 42,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO": 3,
"FPR_UNO.1": 1
},
"FPT": {
"FPT_EMS": 7,
"FPT_EMS.1": 9,
"FPT_EMS.1.1": 4,
"FPT_EMS.1.2": 2,
"FPT_FLS": 5,
"FPT_FLS.1": 10,
"FPT_FLS.1.1": 1,
"FPT_PHP": 2,
"FPT_PHP.1": 5,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 7,
"FPT_PHP.3.1": 1,
"FPT_RCV": 2,
"FPT_TST": 1,
"FPT_TST.1": 13,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 10,
"FTP_ITC.1": 5,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 10
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 8
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 8
},
"SHA2": {
"SHA-224": 2,
"SHA-256": 5,
"SHA-384": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 6
}
},
"side_channel_analysis": {
"FI": {
"DFA": 2,
"fault injection": 2,
"physical tampering": 5
},
"SCA": {
"DPA": 1,
"SPA": 1,
"side channel": 1,
"timing attacks": 1
},
"other": {
"JIL": 1,
"JIL-COMP": 2
}
},
"standard_id": {
"FIPS": {
"FIPS 180-3": 1,
"FIPS PUB 180-3": 1,
"FIPS180-3": 1
},
"ISO": {
"ISO/IEC 9796-2": 4
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 3,
"PKCS#15": 2,
"PKCS#3": 3
},
"SCP": {
"SCP02": 2,
"SCP03": 7
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 17
}
},
"DES": {
"3DES": {
"TDES": 3
},
"DES": {
"DES": 10
}
},
"constructions": {
"MAC": {
"CMAC": 3
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SE": 1
}
},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 18
},
"Morpho": {
"Morpho": 1
},
"NXP": {
"NXP": 4
},
"Oberthur": {
"Oberthur Technologies": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "IDEMIA",
"/CreationDate": "D:20190802141816+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/Keywords": "Quality",
"/ModDate": "D:20190802141816+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Subject": "FQR standard",
"pdf_file_size_bytes": 2730871,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"ftp://ftp.itc.1/SCD"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 89
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_34fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL5+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_34en.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d06d23fa88e48036e7528dc9dbba92dd94db404a9f799631942b9e689d9b921b",
"txt_hash": "c9ec83815c8a49052d4c6e8abcd55cf5b7ba5857adb5e0b5509fc489fcf7ea12"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ae4e0d1a79e0bd5eabca68a84614a2bfcd52f5793cd62fb0eb73afa9b6323faa",
"txt_hash": "be45b228091e4a27184db8c1baaaa6e1c389aaa2e040897e7c498133872d2be0"
}
},
"status": "archived"
}