MULTOS I4C (1-1-1) platform with patch AMD 0029v002 on component SLE66CX322P/m1484a24

CSV information

Status archived
Valid from 04.12.2003
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer Keycorp Limited / Infineon Technologies AG
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, ADV_IMP.2, ALC_DVS.2, AVA_VLA.4

Heuristics summary

Certificate ID: ANSSI-CC-2003/14

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Symmetric Algorithms
DES
Asymmetric Algorithms
RSA 2048

Vendor
Infineon Technologies AG, Infineon

Security level
EAL7, EAL4, EAL 5, EAL41, EAL1, EAL3, EAL5, ITSEC E6 et
Claims
O.DLV_PROTECT, O.DLV_AUDIT, O.DLV_RESP, O.DLV_DATA, O.TEST_OPERATE, O.USE_DIAG, O.CODE_HASH, O.APPLI_DEV
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_FLR, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_MSU.2, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FCS_CKM.3, FCS_CKM.4, FCS_COP.1, FDP_ACC.2, FDP_ACF.1, FDP_DAU.1, FDP_ETC.1, FDP_ITC.1, FDP_RIP.1, FDP_ROL.1, FDP_SDI.2, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UAU.4, FIA_UID.1, FIA_USB.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_SMR.1, FPR_UNO.1, FPT_FLS.1, FPT_PHP.3, FPT_RCV.4, FPT_RVM.1, FPT_SEP.1, FPT_TDC.1, FPT_TST.1, FRU_RSA.1
Protection profiles
BSI-PP-0002
Certificates
BSI-DSZ-CC-0223-2003, Rapport de certification 2003/14, Rapport de certification 2003/01

Standards
CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title Rapport de certification 2003/14
Subject Plate-forme MULTOS I4C (1-1-1)
Author Patrick REDON
Creation date D:20031204162531+01'00'
Modification date D:20031204162711+01'00'
Pages 35
Creator Acrobat PDFMaker 5.0 pour Word
Producer Acrobat Distiller 5.0 (Windows)

References

Outgoing
  • BSI-DSZ-CC-0223-2003 - archived - Infineon Smart Card IC (Security Controller) SLE66CX322P with RSA 2048/m1484 a24/ m1484a27 and m1484b14

Security target

Extracted keywords

Symmetric Algorithms
DES
Hash functions
SHA-1
Randomness
RNG
Block cipher modes
CBC

Vendor
Infineon Technologies, Infineon, Thales

Security level
EAL4, EAL4 augmented
Claims
O.CODE_HASH, O.TAMPER_ES, O.SIDE, O.ROLLBACK, O.RESOURCE, O.LOAD, O.SECURITY, O.EFFECT_L, O.REMOVE, O.EFFECT_R, O.SEGREGATE, O.DEV_DIS_ES, O.INIT_ACS, O.SAMPLE_ACS, O.DLV_DATA, O.APPLI_DEV, O.RESOURCES, O.SAMPLES_ACS, O.DIS_, O.DIS, O.MOD_, O.OPERATE, O.DIS_MEMORY, O.MOD_MEMORY, O.FLAW, O.CLON, T.DIS_TEST_ES, T.T_TOOLS, T.MOD, T.T_ES, T.T_CMD, T.MOD_TSF, T.MOD_LOAD, T.MOD_EXE, T.MOD_SHARE, T.LOAD_MAN, T.LOAD_APP, T.LOAD_OTHER, T.LOAD_MOD, T.APP_DISC, T.APP_CORR, T.APP_REMOVE, T.ERR_REMOVE, T.DEL_REMOVE, T.APP_READ, T.APP_MOD, T.RESOURCES, T.DIS_DATA, T.MOD_DATA, T.DIS_TEST, T.T_SAMPLE, T.MOD_DEL, T.MOD_SOF, T.MOD_LOA, T.MOD_SHA, T.MOD_DAT, T.LOAD_MA, T.LOAD_OT, T.LOAD_MO, T.APP_COR, T.APP_REM, T.ERR_REM, T.DEL_REM, T.APP_REA, T.RESOURC, T.CLON, T.DIS_INFO, T.DIS_DEL, T.MOD_SOFT, A.APPLI_CONT
Security Assurance Requirements (SAR)
ADV_IMP, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ADV_IMP.1, ADV_HLD, ADV_LLD, AGD_ADM.1, AGD_USR.1, AGD_ADM, ALC_DVS, ALC_DVS.2, ALC_TAT.1, ALC_DVS.1, AVA_VLA, AVA_VLA.4
Security Functional Requirements (SFR)
FAU_ARP, FAU_SAA, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAA.1, FCS_CKM, FCS_COP, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FDP_ACC, FDP_ACF, FDP_DAU, FDP_ETC, FDP_ITC, FDP_RIP, FDP_ROL, FDP_SDI, FDP_ACC.2, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_DAU.1, FDP_DAU.1.1, FDP_DAU.1.2, FDP_ETC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_RIP.1, FDP_RIP.1.1, FDP_ROL.1, FDP_ROL.1.1, FDP_ROL.1.2, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FIA_AFL, FIA_ATD, FIA_UAU, FIA_UID, FIA_USB, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.4.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1, FIA_USB.1.1, FMT_MOF, FMT_MSA, FMT_MTD, FMT_SMR, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.2, FMT_MTD.2.1, FMT_MTD.2.2, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS, FPT_PHP, FPT_RCV, FPT_RVM, FPT_SEP, FPT_TDC, FPT_TST, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_RCV.4, FPT_RCV.4.1, FPT_RVM.1, FPT_RVM.1.1, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FRU_RSA, FRU_RSA.1, FRU_RSA.1.1

Side-channel analysis
side channel, SPA, DPA, Timing attacks, timing attack, timing attacks, physical tampering, Physical tampering
Certification process
out of scope, Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements, strength level of these security functions is “SOF high”. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 6.1.1

Standards
FIPS PUB 180-2, PKCS # 1, PKCS#2

File metadata

Title Public Security Target
Subject Keycorp MULTOS Common Criteria
Author Thales Microelectronics & Keycorp MULTOS Team
Creation date D:20040526124355
Modification date D:20040526124445+11'00'
Pages 85
Creator Microsoft Word 8.0
Producer Acrobat Distiller 4.0 for Windows

Heuristics

Certificate ID: ANSSI-CC-2003/14

Extracted SARs

ADV_FSP.1, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.3, AVA_SOF.1, AVA_VLA.4

References

Loading...

Updates

  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': None, 'eal': 'EAL4+'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3979eb58e5c3ee9abc048d5c36861ff230bfc68cb37f01c29bc103e1612dfa61', 'txt_hash': '3a0158df6abcb2abd887b7e4b9ae3276c1582aaa803e59f0ad08d6c9e645c49e'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'fb17d9af5360e801f93a406d87aa8efb76a926e679dc6383c116551c4eb2495a', 'txt_hash': 'bfce1933bc4dce3591006fedb708451ad6cc98b189598e2f1465b2cff2cad249'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 867591, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 35, '/Author': 'Patrick REDON', '/CreationDate': "D:20031204162531+01'00'", '/Creator': 'Acrobat PDFMaker 5.0 pour Word', '/ModDate': "D:20031204162711+01'00'", '/Producer': 'Acrobat Distiller 5.0 (Windows)', '/Subject': 'Plate-forme MULTOS I4C (1-1-1)', '/Title': 'Rapport de certification 2003/14', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'mailto:[email protected]']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 652006, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 85, '/Producer': 'Acrobat Distiller 4.0 for Windows', '/Creator': 'Microsoft Word 8.0', '/ModDate': "D:20040526124445+11'00'", '/Author': 'Thales Microelectronics & Keycorp MULTOS Team', '/Subject': 'Keycorp MULTOS Common Criteria', '/Title': 'Public Security Target', '/CreationDate': 'D:20040526124355', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0223-2003': 3}, 'FR': {'Rapport de certification 2003/14': 18, 'Rapport de certification 2003/01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002': 1}}, 'cc_security_level': {'EAL': {'EAL7': 2, 'EAL4': 1, 'EAL 5': 1, 'EAL41': 1, 'EAL1': 1, 'EAL3': 1, 'EAL5': 1}, 'ITSEC': {'ITSEC E6 et': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 1, 'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL.2': 1, 'ADO_IGS.1': 1, 'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_IMP.2': 3, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_FLR': 2, 'ALC_DVS.2': 4, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_MSU.3': 1, 'AVA_VLA.4': 4, 'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_CCA': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 2, 'FAU_SAA.1': 2}, 'FCS': {'FCS_CKM.3': 2, 'FCS_CKM.4': 2, 'FCS_COP.1': 2}, 'FDP': {'FDP_ACC.2': 2, 'FDP_ACF.1': 2, 'FDP_DAU.1': 2, 'FDP_ETC.1': 2, 'FDP_ITC.1': 2, 'FDP_RIP.1': 2, 'FDP_ROL.1': 2, 'FDP_SDI.2': 2}, 'FIA': {'FIA_AFL.1': 2, 'FIA_ATD.1': 2, 'FIA_UAU.1': 2, 'FIA_UAU.4': 2, 'FIA_UID.1': 2, 'FIA_USB.1': 2}, 'FMT': {'FMT_MOF.1': 2, 'FMT_MSA.1': 2, 'FMT_MSA.2': 2, 'FMT_MSA.3': 2, 'FMT_MTD.1': 2, 'FMT_MTD.2': 2, 'FMT_SMR.1': 2}, 'FPR': {'FPR_UNO.1': 2}, 'FPT': {'FPT_FLS.1': 2, 'FPT_PHP.3': 2, 'FPT_RCV.4': 2, 'FPT_RVM.1': 2, 'FPT_SEP.1': 2, 'FPT_TDC.1': 2, 'FPT_TST.1': 2}, 'FRU': {'FRU_RSA.1': 2}}, 'cc_claims': {'O': {'O.DLV_PROTECT': 1, 'O.DLV_AUDIT': 1, 'O.DLV_RESP': 1, 'O.DLV_DATA': 1, 'O.TEST_OPERATE': 1, 'O.USE_DIAG': 1, 'O.CODE_HASH': 1, 'O.APPLI_DEV': 1}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 7, 'Infineon': 7}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 4}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 17, 'EAL4 augmented': 3}}, 'cc_sar': {'ADV': {'ADV_IMP': 3, 'ADV_IMP.2': 10, 'ADV_LLD.1': 3, 'ADV_RCR.1': 2, 'ADV_FSP.1': 2, 'ADV_HLD.2': 1, 'ADV_IMP.1': 2, 'ADV_HLD': 1, 'ADV_LLD': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 2, 'AGD_ADM': 1}, 'ALC': {'ALC_DVS': 2, 'ALC_DVS.2': 10, 'ALC_TAT.1': 2, 'ALC_DVS.1': 1}, 'AVA': {'AVA_VLA': 3, 'AVA_VLA.4': 15}}, 'cc_sfr': {'FAU': {'FAU_ARP': 2, 'FAU_SAA': 2, 'FAU_ARP.1': 11, 'FAU_ARP.1.1': 2, 'FAU_SAA.1.1': 2, 'FAU_SAA.1.2': 2, 'FAU_SAA.1': 15}, 'FCS': {'FCS_CKM': 2, 'FCS_COP': 2, 'FCS_CKM.3': 12, 'FCS_CKM.3.1': 1, 'FCS_CKM.4': 12, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 12, 'FCS_COP.1.1': 4}, 'FDP': {'FDP_ACC': 2, 'FDP_ACF': 2, 'FDP_DAU': 2, 'FDP_ETC': 2, 'FDP_ITC': 2, 'FDP_RIP': 2, 'FDP_ROL': 2, 'FDP_SDI': 2, 'FDP_ACC.2': 15, 'FDP_ACC.2.1': 2, 'FDP_ACC.2.2': 1, 'FDP_ACF.1': 14, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_DAU.1': 9, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_ETC.1': 5, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ITC.1': 10, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_RIP.1': 8, 'FDP_RIP.1.1': 1, 'FDP_ROL.1': 4, 'FDP_ROL.1.1': 1, 'FDP_ROL.1.2': 1, 'FDP_SDI.2': 6, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1}, 'FIA': {'FIA_AFL': 2, 'FIA_ATD': 2, 'FIA_UAU': 2, 'FIA_UID': 2, 'FIA_USB': 2, 'FIA_AFL.1': 8, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 7, 'FIA_ATD.1.1': 1, 'FIA_UAU.1': 10, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 7, 'FIA_UAU.4.1': 1, 'FIA_UID.1': 10, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1': 8, 'FIA_USB.1.1': 1}, 'FMT': {'FMT_MOF': 2, 'FMT_MSA': 2, 'FMT_MTD': 2, 'FMT_SMR': 2, 'FMT_MOF.1': 8, 'FMT_MOF.1.1': 2, 'FMT_MSA.1': 12, 'FMT_MSA.1.1': 1, 'FMT_MSA.2': 9, 'FMT_MSA.2.1': 1, 'FMT_MSA.3': 10, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 7, 'FMT_MTD.1.1': 1, 'FMT_MTD.2': 6, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_SMR.1': 9, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPR': {'FPR_UNO': 3, 'FPR_UNO.1': 7, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS': 2, 'FPT_PHP': 2, 'FPT_RCV': 2, 'FPT_RVM': 2, 'FPT_SEP': 2, 'FPT_TDC': 2, 'FPT_TST': 3, 'FPT_FLS.1': 10, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 10, 'FPT_PHP.3.1': 1, 'FPT_RCV.4': 4, 'FPT_RCV.4.1': 1, 'FPT_RVM.1': 6, 'FPT_RVM.1.1': 1, 'FPT_SEP.1': 11, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_TDC.1': 5, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1': 6, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FRU': {'FRU_RSA': 2, 'FRU_RSA.1': 5, 'FRU_RSA.1.1': 1}}, 'cc_claims': {'O': {'O.CODE_HASH': 2, 'O.TAMPER_ES': 11, 'O.SIDE': 4, 'O.ROLLBACK': 3, 'O.RESOURCE': 2, 'O.LOAD': 4, 'O.SECURITY': 4, 'O.EFFECT_L': 4, 'O.REMOVE': 4, 'O.EFFECT_R': 3, 'O.SEGREGATE': 4, 'O.DEV_DIS_ES': 6, 'O.INIT_ACS': 4, 'O.SAMPLE_ACS': 2, 'O.DLV_DATA': 3, 'O.APPLI_DEV': 4, 'O.RESOURCES': 1, 'O.SAMPLES_ACS': 1, 'O.DIS_': 1, 'O.DIS': 1, 'O.MOD_': 1, 'O.OPERATE': 1, 'O.DIS_MEMORY': 1, 'O.MOD_MEMORY': 1, 'O.FLAW': 1, 'O.CLON': 1}, 'T': {'T.DIS_TEST_ES': 4, 'T.T_TOOLS': 5, 'T.MOD': 5, 'T.T_ES': 5, 'T.T_CMD': 5, 'T.MOD_TSF': 5, 'T.MOD_LOAD': 4, 'T.MOD_EXE': 5, 'T.MOD_SHARE': 4, 'T.LOAD_MAN': 4, 'T.LOAD_APP': 6, 'T.LOAD_OTHER': 4, 'T.LOAD_MOD': 6, 'T.APP_DISC': 9, 'T.APP_CORR': 4, 'T.APP_REMOVE': 4, 'T.ERR_REMOVE': 4, 'T.DEL_REMOVE': 4, 'T.APP_READ': 4, 'T.APP_MOD': 5, 'T.RESOURCES': 4, 'T.DIS_DATA': 5, 'T.MOD_DATA': 3, 'T.DIS_TEST': 1, 'T.T_SAMPLE': 1, 'T.MOD_DEL': 3, 'T.MOD_SOF': 1, 'T.MOD_LOA': 1, 'T.MOD_SHA': 1, 'T.MOD_DAT': 1, 'T.LOAD_MA': 1, 'T.LOAD_OT': 1, 'T.LOAD_MO': 1, 'T.APP_COR': 1, 'T.APP_REM': 1, 'T.ERR_REM': 1, 'T.DEL_REM': 1, 'T.APP_REA': 1, 'T.RESOURC': 1, 'T.CLON': 1, 'T.DIS_INFO': 1, 'T.DIS_DEL': 1, 'T.MOD_SOFT': 1}, 'A': {'A.APPLI_CONT': 1}}, 'vendor': {'Infineon': {'Infineon Technologies': 5, 'Infineon': 2}, 'Thales': {'Thales': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 16}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 4}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'side channel': 2, 'SPA': 2, 'DPA': 2, 'Timing attacks': 1, 'timing attack': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'Physical tampering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 180-2': 1}, 'PKCS': {'PKCS # 1': 1, 'PKCS#2': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, ' Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements': 1, 'strength level of these security functions is “SOF high”. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 6.1.1': 1}}}.
    • The report_filename property was set to 2003_14.pdf.
    • The st_filename property was set to cible2003_14.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2003/14.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0223-2003']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0223-2003', 'BSI-DSZ-CC-0169-2002']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2003_14.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2003_14.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0169-2002']}}} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name MULTOS I4C (1-1-1) platform with patch AMD 0029v002 on component SLE66CX322P/m1484a24 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "72ed5b59efbf992c",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2003/14",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ENV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_PPC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_DES",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0223-2003"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0223-2003",
          "BSI-DSZ-CC-0169-2002"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Keycorp Limited / Infineon Technologies AG",
  "manufacturer_web": "https://www.keycorp.net/",
  "name": "MULTOS I4C (1-1-1) platform with patch AMD 0029v002 on component SLE66CX322P/m1484a24",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2003-12-04",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "2003_14.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA 2048": 2
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0223-2003": 3
        },
        "FR": {
          "Rapport de certification 2003/01": 1,
          "Rapport de certification 2003/14": 18
        }
      },
      "cc_claims": {
        "O": {
          "O.APPLI_DEV": 1,
          "O.CODE_HASH": 1,
          "O.DLV_AUDIT": 1,
          "O.DLV_DATA": 1,
          "O.DLV_PROTECT": 1,
          "O.DLV_RESP": 1,
          "O.TEST_OPERATE": 1,
          "O.USE_DIAG": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0002": 1
        }
      },
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_AUT.1": 1,
          "ACM_CAP": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP": 1,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_DEL.2": 1,
          "ADO_IGS": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.2": 1,
          "ADV_HLD": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 3,
          "ADV_INT": 1,
          "ADV_LLD": 1,
          "ADV_LLD.1": 1,
          "ADV_RCR": 1,
          "ADV_RCR.1": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 1,
          "AGD_USR": 1,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.2": 4,
          "ALC_FLR": 2,
          "ALC_LCD.1": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_DES.1": 1,
          "ASE_ENV.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_PPC.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SRE.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA": 1,
          "AVA_MSU": 1,
          "AVA_MSU.2": 1,
          "AVA_MSU.3": 1,
          "AVA_SOF": 1,
          "AVA_SOF.1": 1,
          "AVA_VLA": 1,
          "AVA_VLA.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL1": 1,
          "EAL3": 1,
          "EAL4": 1,
          "EAL41": 1,
          "EAL5": 1,
          "EAL7": 2
        },
        "ITSEC": {
          "ITSEC E6 et": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 2,
          "FAU_SAA.1": 2
        },
        "FCS": {
          "FCS_CKM.3": 2,
          "FCS_CKM.4": 2,
          "FCS_COP.1": 2
        },
        "FDP": {
          "FDP_ACC.2": 2,
          "FDP_ACF.1": 2,
          "FDP_DAU.1": 2,
          "FDP_ETC.1": 2,
          "FDP_ITC.1": 2,
          "FDP_RIP.1": 2,
          "FDP_ROL.1": 2,
          "FDP_SDI.2": 2
        },
        "FIA": {
          "FIA_AFL.1": 2,
          "FIA_ATD.1": 2,
          "FIA_UAU.1": 2,
          "FIA_UAU.4": 2,
          "FIA_UID.1": 2,
          "FIA_USB.1": 2
        },
        "FMT": {
          "FMT_MOF.1": 2,
          "FMT_MSA.1": 2,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 2,
          "FMT_MTD.1": 2,
          "FMT_MTD.2": 2,
          "FMT_SMR.1": 2
        },
        "FPR": {
          "FPR_UNO.1": 2
        },
        "FPT": {
          "FPT_FLS.1": 2,
          "FPT_PHP.3": 2,
          "FPT_RCV.4": 2,
          "FPT_RVM.1": 2,
          "FPT_SEP.1": 2,
          "FPT_TDC.1": 2,
          "FPT_TST.1": 2
        },
        "FRU": {
          "FRU_RSA.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 7,
          "Infineon Technologies AG": 7
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Patrick REDON",
      "/CreationDate": "D:20031204162531+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 5.0 pour Word",
      "/ModDate": "D:20031204162711+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0 (Windows)",
      "/Subject": "Plate-forme MULTOS I4C (1-1-1)",
      "/Title": "Rapport de certification 2003/14",
      "pdf_file_size_bytes": 867591,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 35
    },
    "st_filename": "cible2003_14.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.APPLI_CONT": 1
        },
        "O": {
          "O.APPLI_DEV": 4,
          "O.CLON": 1,
          "O.CODE_HASH": 2,
          "O.DEV_DIS_ES": 6,
          "O.DIS": 1,
          "O.DIS_": 1,
          "O.DIS_MEMORY": 1,
          "O.DLV_DATA": 3,
          "O.EFFECT_L": 4,
          "O.EFFECT_R": 3,
          "O.FLAW": 1,
          "O.INIT_ACS": 4,
          "O.LOAD": 4,
          "O.MOD_": 1,
          "O.MOD_MEMORY": 1,
          "O.OPERATE": 1,
          "O.REMOVE": 4,
          "O.RESOURCE": 2,
          "O.RESOURCES": 1,
          "O.ROLLBACK": 3,
          "O.SAMPLES_ACS": 1,
          "O.SAMPLE_ACS": 2,
          "O.SECURITY": 4,
          "O.SEGREGATE": 4,
          "O.SIDE": 4,
          "O.TAMPER_ES": 11
        },
        "T": {
          "T.APP_COR": 1,
          "T.APP_CORR": 4,
          "T.APP_DISC": 9,
          "T.APP_MOD": 5,
          "T.APP_REA": 1,
          "T.APP_READ": 4,
          "T.APP_REM": 1,
          "T.APP_REMOVE": 4,
          "T.CLON": 1,
          "T.DEL_REM": 1,
          "T.DEL_REMOVE": 4,
          "T.DIS_DATA": 5,
          "T.DIS_DEL": 1,
          "T.DIS_INFO": 1,
          "T.DIS_TEST": 1,
          "T.DIS_TEST_ES": 4,
          "T.ERR_REM": 1,
          "T.ERR_REMOVE": 4,
          "T.LOAD_APP": 6,
          "T.LOAD_MA": 1,
          "T.LOAD_MAN": 4,
          "T.LOAD_MO": 1,
          "T.LOAD_MOD": 6,
          "T.LOAD_OT": 1,
          "T.LOAD_OTHER": 4,
          "T.MOD": 5,
          "T.MOD_DAT": 1,
          "T.MOD_DATA": 3,
          "T.MOD_DEL": 3,
          "T.MOD_EXE": 5,
          "T.MOD_LOA": 1,
          "T.MOD_LOAD": 4,
          "T.MOD_SHA": 1,
          "T.MOD_SHARE": 4,
          "T.MOD_SOF": 1,
          "T.MOD_SOFT": 1,
          "T.MOD_TSF": 5,
          "T.RESOURC": 1,
          "T.RESOURCES": 4,
          "T.T_CMD": 5,
          "T.T_ES": 5,
          "T.T_SAMPLE": 1,
          "T.T_TOOLS": 5
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 2,
          "ADV_HLD": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP": 3,
          "ADV_IMP.1": 2,
          "ADV_IMP.2": 10,
          "ADV_LLD": 1,
          "ADV_LLD.1": 3,
          "ADV_RCR.1": 2
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 1,
          "AGD_USR.1": 2
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 10,
          "ALC_TAT.1": 2
        },
        "AVA": {
          "AVA_VLA": 3,
          "AVA_VLA.4": 15
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 17,
          "EAL4 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP": 2,
          "FAU_ARP.1": 11,
          "FAU_ARP.1.1": 2,
          "FAU_SAA": 2,
          "FAU_SAA.1": 15,
          "FAU_SAA.1.1": 2,
          "FAU_SAA.1.2": 2
        },
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.3": 12,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 12,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 2,
          "FCS_COP.1": 12,
          "FCS_COP.1.1": 4
        },
        "FDP": {
          "FDP_ACC": 2,
          "FDP_ACC.2": 15,
          "FDP_ACC.2.1": 2,
          "FDP_ACC.2.2": 1,
          "FDP_ACF": 2,
          "FDP_ACF.1": 14,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_DAU": 2,
          "FDP_DAU.1": 9,
          "FDP_DAU.1.1": 1,
          "FDP_DAU.1.2": 1,
          "FDP_ETC": 2,
          "FDP_ETC.1": 5,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_ITC": 2,
          "FDP_ITC.1": 10,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_RIP": 2,
          "FDP_RIP.1": 8,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 2,
          "FDP_ROL.1": 4,
          "FDP_ROL.1.1": 1,
          "FDP_ROL.1.2": 1,
          "FDP_SDI": 2,
          "FDP_SDI.2": 6,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL.1": 8,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 2,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 1,
          "FIA_UAU": 2,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 7,
          "FIA_UAU.4.1": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 10,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 2,
          "FIA_USB.1": 8,
          "FIA_USB.1.1": 1
        },
        "FMT": {
          "FMT_MOF": 2,
          "FMT_MOF.1": 8,
          "FMT_MOF.1.1": 2,
          "FMT_MSA": 2,
          "FMT_MSA.1": 12,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 9,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 10,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 2,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.2": 6,
          "FMT_MTD.2.1": 1,
          "FMT_MTD.2.2": 1,
          "FMT_SMR": 2,
          "FMT_SMR.1": 9,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO": 3,
          "FPR_UNO.1": 7,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS": 2,
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_PHP": 2,
          "FPT_PHP.3": 10,
          "FPT_PHP.3.1": 1,
          "FPT_RCV": 2,
          "FPT_RCV.4": 4,
          "FPT_RCV.4.1": 1,
          "FPT_RVM": 2,
          "FPT_RVM.1": 6,
          "FPT_RVM.1.1": 1,
          "FPT_SEP": 2,
          "FPT_SEP.1": 11,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_TDC": 2,
          "FPT_TDC.1": 5,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST": 3,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FRU": {
          "FRU_RSA": 2,
          "FRU_RSA.1": 5,
          "FRU_RSA.1.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          " Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements": 1,
          "out of scope": 1,
          "strength level of these security functions is \u201cSOF high\u201d. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 6.1.1": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 4
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Physical tampering": 1,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 2,
          "Timing attacks": 1,
          "side channel": 2,
          "timing attack": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS PUB 180-2": 1
        },
        "PKCS": {
          "PKCS # 1": 1,
          "PKCS#2": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 16
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 2,
          "Infineon Technologies": 5
        },
        "Thales": {
          "Thales": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Thales Microelectronics \u0026 Keycorp MULTOS Team",
      "/CreationDate": "D:20040526124355",
      "/Creator": "Microsoft Word 8.0",
      "/ModDate": "D:20040526124445+11\u002700\u0027",
      "/Producer": "Acrobat Distiller 4.0 for Windows",
      "/Subject": "Keycorp MULTOS Common Criteria",
      "/Title": "Public Security Target",
      "pdf_file_size_bytes": 652006,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 85
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2003_14.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "ADV_IMP.2",
      "AVA_VLA.4",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2003_14.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3979eb58e5c3ee9abc048d5c36861ff230bfc68cb37f01c29bc103e1612dfa61",
      "txt_hash": "3a0158df6abcb2abd887b7e4b9ae3276c1582aaa803e59f0ad08d6c9e645c49e"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "fb17d9af5360e801f93a406d87aa8efb76a926e679dc6383c116551c4eb2495a",
      "txt_hash": "bfce1933bc4dce3591006fedb708451ad6cc98b189598e2f1465b2cff2cad249"
    }
  },
  "status": "archived"
}