HICOS PKI Applet on ID-one Cosmo V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N Large Platform on NXP P6022M (version 03 02)
CSV information ?
Status | archived |
---|---|
Valid from | 14.02.2018 |
Valid until | 14.02.2023 |
Scheme | 🇫🇷 FR |
Manufacturer | Oberthur Technologies / NXP Semiconductors GmbH |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VAN.5, ALC_DVS.2, EAL5+ |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESVendor
NXP, NXP Semiconductors, Oberthur Technologies, OBERTHUR, IDEMIASecurity level
EAL5, EAL2, EAL 5, EAL7, EAL 1, EAL 3, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_PRE, AGD_OPE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP- 0059-2009-MA-01, BSI-CC-PP- 0075-2012, BSI-PP-0084-2014, PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Certificates
BSI-DSZ-CC-0955-, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-0955-V2-, BSI-DSZ-CC-0973-V2-, ANSSI-CC-2017/68, ANSSI-CC-2017/47Evaluation facilities
CESTI, CEA - LETIStandards
CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Keywords | ANSSI-CC-CER-F-07.026 |
---|---|
Creation date | D:20180309163423+01'00' |
Modification date | D:20180313142628+01'00' |
Pages | 15 |
Creator | Acrobat PDFMaker 11 pour Word |
Producer | Adobe PDF Library 11.0 |
Frontpage
Certificate ID | ANSSI-CC-2017/68 |
---|---|
Certified item | HICOS PKI Applet on ID-one Cosmo V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N Large Platform on NXP P6022M |
Certification lab | CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France |
Developer | Chunghwa Telecom (CHT) N°99 Dianyan Road – Yangmei Distric, Taiwan Taoyuan City 32661, Taiwan IDEMIA (ex Oberthur Technologies) 420 rue d’Estienne d’Orves, 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101, 22539 Hamburg, Allemagne Commanditaire IDEMIA 420 rue d’Estienne d’Orves, 92700 Colombes, France |
References
Outgoing- ANSSI-CC-2017/47 - archived - Plateforme ID-One Cosmo v8.1-N-Standard LDS masquée sur le composant NXP P6021M VB
- BSI-DSZ-CC-0973-V2-2016 - archived - NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES-128, AES-192, AES-256, DES, TDEA, Triple-DES, TDES, CMACAsymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC, DHHash functions
SHA-256, SHA-512, SHA-224, SHA-384, SHA256, SHA384, SHA512Schemes
MACProtocols
PACERandomness
DRBG, RNGElliptic Curves
P-224, P-256, P-384, P-521Block cipher modes
ECB, CBCJavaCard versions
Java Card 3.0.4, GlobalPlatform 2.1.1IC data groups
EF.CardAccessVendor
NXP, Oberthur Technologies, Oberthur, OBERTHUR, IDEMIA, MorphoSecurity level
EAL5+, EAL5, EAL 5Claims
A.CGA, A.SCA, A.CSP, OE.HID_VADSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_DPT.1, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1.1, FCS_COP, FCS_CKM.1.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FDP_IFC.1, FDP_ITC, FDP_UCT, FDP_UCT.1, FDP_ETC.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL, FIA_ATD.1, FMT_MSA.3, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_SMF, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_TRP.1, FTP_ITCProtection profiles
BSI-PP-0035Certificates
BSI-DSZ-CC-0955-V2-, BSI-DSZ-CC-0973-V2-, ANSSI-CC-2017/47, ANSSI-CC-2017/49-M1, ANSSI-CC-2017/49-M01, ANSSI-CC-2017/49Side-channel analysis
SPA, DPA, timing attacks, physical tampering, JILStandards
FIPS PUB 46-3, FIPS PUB 81, FIPS PUB 140-2, FIPS PUB 180-3, FIPS PUB 186-3, FIPS PUB 197, FIPS 197, FIPS 180-2, FIPS 186-4, FIPS 186, SP 800-90A, SP 800-67, SP 800-38F, SP 800-38B, SP 800-108, SP 800-56B, PKCS#1, PKCS#15, AIS31, AIS 31, ISO/IEC 9796-1, ISO/IEC 9797-1, ISO/IEC 14443-3, ISO/IEC 14443-4, ISO/IEC 7816-3, ISO/IEC 14443, SCP03File metadata
Creation date | D:20180209155337+01'00' |
---|---|
Modification date | D:20180313142638+01'00' |
Pages | 82 |
Creator | Microsoft® Word 2016 |
Producer | Microsoft® Word 2016 |
References
Outgoing- ANSSI-CC-2017/47 - archived - Plateforme ID-One Cosmo v8.1-N-Standard LDS masquée sur le composant NXP P6021M VB
- ANSSI-CC-2017/49 - active - Plateforme ID-One Cosmo v8.1-N- Large masquée sur le composant NXP P6022M VB
Heuristics ?
Extracted SARs
ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, ASE_TSS.2, ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_FSP.4Similar certificates
Scheme data ?
Product | HICOS PKI Applet on ID-one Cosmo V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N Large Platform on NXP P6022M (version 03 02) | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/hicos-pki-applet-id-one-cosmo-v81-standard-lds-platform-nxp-p6021m-vb-and-id-one | |
Description | Le produit certifié est « Hicos PKI Applet on Oberthur Technologies ID-one V8.1, Version 0302 » développé par CHUNGHWA TELECOM, IDEMIA et NXP SEMICONDUCTORS GMBH. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD, Secure Signature Creation Device). | |
Sponsor | IDEMIA | |
Developer | Chunghwa Telecom (CHT), IDEMIA, NXP Semiconductors GmbH | |
Cert Id | ANSSI-CC-2017/68 | |
Level | EAL5+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2017/68 | |
Certification Date | 14.02.2018 | |
Category | Cartes Ă puce | |
Cc Version | Critères Communs version 3.1r4 | |
Developer | Chunghwa Telecom (CHT), IDEMIA, NXP Semiconductors GmbH | |
Sponsor | IDEMIA | |
Evaluation Facility | CEA - LETI | |
Level | EAL5+ | |
Protection Profile | PP-SSCD-Part2, PP-SSCD-Part3 | |
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Target Link | https://cyber.gouv.fr/sites/default/files/2018/03/anssi-cc-2017-68-public-security-target.pdf | |
Report Link | https://cyber.gouv.fr/sites/default/files/2018/03/anssi-cc-2017_68fr_mod.pdf |
References ?
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'HICOS PKI Applet on ID-one Cosmo V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N Large Platform on NXP P6022M (version 03 02)', 'url': 'https://cyber.gouv.fr/produits-certifies/hicos-pki-applet-id-one-cosmo-v81-standard-lds-platform-nxp-p6021m-vb-and-id-one', 'description': 'Le produit certifié est « Hicos PKI Applet on Oberthur Technologies ID-one V8.1, Version 0302 » développé par CHUNGHWA TELECOM, IDEMIA et NXP SEMICONDUCTORS GMBH. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD, Secure Signature Creation Device). ', 'sponsor': 'IDEMIA', 'developer': 'Chunghwa Telecom (CHT), IDEMIA, NXP Semiconductors GmbH', 'cert_id': 'ANSSI-CC-2017/68', 'level': 'EAL5+', 'enhanced': {'cert_id': 'ANSSI-CC-2017/68', 'certification_date': '2018-02-14', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'Chunghwa Telecom (CHT), IDEMIA, NXP Semiconductors GmbH', 'sponsor': 'IDEMIA', 'evaluation_facility': 'CEA - LETI', 'level': 'EAL5+', 'protection_profile': 'PP-SSCD-Part2, PP-SSCD-Part3', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2018/03/anssi-cc-2017-68-public-security-target.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2018/03/anssi-cc-2017_68fr_mod.pdf'}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a06db865e488b3c8bf027863cc0fc10e894071f217897758912373bf4a806363', 'txt_hash': 'c8c17b6582c526c5d4fc881e0f977be55ff5b1983aa0d9a48a89cc640f06eccd'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1880d3e6b83a19511c742309706977575ad6cdd61ad07dd34e514f0e94961ebe', 'txt_hash': '163391a65f232609034349bf85d539f6dfa4727c1bdadab6fae9d626ac9170fe'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 258888, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 15, '/Category': 'Référence, Version', '/Comments': 'Développeur', '/Company': 'SGDSN/ANSSI', '/CreationDate': "D:20180309163423+01'00'", '/Creator': 'Acrobat PDFMaker 11 pour Word', '/Keywords': 'ANSSI-CC-CER-F-07.026', '/ModDate': "D:20180313142628+01'00'", '/Producer': 'Adobe PDF Library 11.0', '/SourceModified': 'D:20180309153419', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.ssi.gouv.fr/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1637494, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 82, '/CreationDate': "D:20180209155337+01'00'", '/Creator': 'Microsoft® Word 2016', '/ModDate': "D:20180313142638+01'00'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2017/68', 'cert_item': 'HICOS PKI Applet on ID-one Cosmo V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N Large Platform on NXP P6022M', 'cert_item_version': 'Version 03 02', 'ref_protection_profiles': 'PP-SSCD-Part2] Protection profiles for secure signature creation device - Device with key generation, v2.0.1 ; [PP-SSCD-Part3] Protection profiles for secure signature creation device - Device with key import, v1.0.2', 'cc_version': 'Critères Communs version 3.1 révision 4', 'cc_security_level': 'EAL5 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'Chunghwa Telecom (CHT) N°99 Dianyan Road – Yangmei Distric, Taiwan Taoyuan City 32661, Taiwan IDEMIA (ex Oberthur Technologies) 420 rue d’Estienne d’Orves, 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101, 22539 Hamburg, Allemagne Commanditaire IDEMIA 420 rue d’Estienne d’Orves, 92700 Colombes, France', 'cert_lab': 'CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0955-': 1, 'BSI-DSZ-CC-0973-V2-2016': 1, 'BSI-DSZ-CC-0955-V2-': 1, 'BSI-DSZ-CC-0973-V2-': 1}, 'FR': {'ANSSI-CC-2017/68': 16, 'ANSSI-CC-2017/47': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP- 0059-2009-MA-01': 1, 'BSI-CC-PP- 0075-2012': 1, 'BSI-PP-0084-2014': 1}, 'other': {'PP-SSCD-Part2': 2, 'PP-SSCD-Part3': 1, 'PP-SSCD-': 3}}, 'cc_security_level': {'EAL': {'EAL5': 2, 'EAL2': 2, 'EAL 5': 2, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_PRE': 4, 'AGD_OPE': 2}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 2}, 'ASE': {'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 46, 'NXP Semiconductors': 1}, 'Oberthur': {'Oberthur Technologies': 3, 'OBERTHUR': 2}, 'Idemia': {'IDEMIA': 8}}, 'eval_facility': {'CESTI': {'CESTI': 1}, 'CEA-LETI': {'CEA - LETI': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0955-V2-': 2, 'BSI-DSZ-CC-0973-V2-': 4}, 'FR': {'ANSSI-CC-2017/47': 2, 'ANSSI-CC-2017/49-M1': 1, 'ANSSI-CC-2017/49-M01': 1, 'ANSSI-CC-2017/49': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL5+': 1, 'EAL5': 4, 'EAL 5': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1, 'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_PRE': 7, 'AGD_OPE': 5, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 9, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 9, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 3, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FCS': {'FCS_RNG': 3, 'FCS_RNG.1': 4, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.1': 9, 'FCS_CKM.2': 2, 'FCS_COP.1': 18, 'FCS_CKM.4': 8, 'FCS_CKM.4.1': 2, 'FCS_COP.1.1': 1, 'FCS_COP': 4, 'FCS_CKM.1.1': 1}, 'FDP': {'FDP_ACF': 14, 'FDP_ITC.1': 10, 'FDP_ITC.2': 2, 'FDP_ACC': 7, 'FDP_ACF.1': 30, 'FDP_ACC.1': 21, 'FDP_RIP.1': 2, 'FDP_RIP.1.1': 2, 'FDP_SDI': 4, 'FDP_SDI.1': 2, 'FDP_SDI.2': 6, 'FDP_IFC.1': 6, 'FDP_ITC': 3, 'FDP_UCT': 4, 'FDP_UCT.1': 1, 'FDP_ETC.1': 3}, 'FIA': {'FIA_UID.1': 5, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 4, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_AFL.1': 4, 'FIA_AFL.1.1': 2, 'FIA_AFL': 3, 'FIA_ATD.1': 2}, 'FMT': {'FMT_MSA.3': 8, 'FMT_SMR.1': 10, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1': 9, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 3, 'FMT_MOF.1.1': 1, 'FMT_MSA': 5, 'FMT_MSA.1': 10, 'FMT_MSA.2': 3, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MSA.4': 3, 'FMT_MSA.4.1': 1, 'FMT_MTD': 8, 'FMT_MTD.1': 12, 'FMT_SMF': 1}, 'FPT': {'FPT_EMS': 7, 'FPT_EMS.1': 5, 'FPT_EMS.1.1': 2, 'FPT_EMS.1.2': 1, 'FPT_TST.1': 5, 'FPT_FLS.1': 3, 'FPT_FLS.1.1': 1, 'FPT_TST': 1, 'FPT_PHP.1': 3, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_PHP.3': 3, 'FPT_PHP.3.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 4, 'FTP_TRP.1': 1, 'FTP_ITC': 2}}, 'cc_claims': {'A': {'A.CGA': 1, 'A.SCA': 1, 'A.CSP': 1}, 'OE': {'OE.HID_VAD': 1}}, 'vendor': {'NXP': {'NXP': 8}, 'Oberthur': {'Oberthur Technologies': 15, 'Oberthur': 5, 'OBERTHUR': 4}, 'Idemia': {'IDEMIA': 4}, 'Morpho': {'Morpho': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 30, 'AES-128': 3, 'AES-192': 2, 'AES-256': 2}}, 'DES': {'DES': {'DES': 8}, '3DES': {'TDEA': 1, 'Triple-DES': 2, 'TDES': 1}}, 'constructions': {'MAC': {'CMAC': 7}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2}, 'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 6}, 'ECC': {'ECC': 14}}, 'FF': {'DH': {'DH': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA-256': 3, 'SHA-512': 4, 'SHA-224': 1, 'SHA-384': 2, 'SHA256': 1, 'SHA384': 1, 'SHA512': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 3}}, 'crypto_protocol': {'PACE': {'PACE': 1}}, 'randomness': {'PRNG': {'DRBG': 2}, 'RNG': {'RNG': 9}}, 'cipher_mode': {'ECB': {'ECB': 2}, 'CBC': {'CBC': 10}}, 'ecc_curve': {'NIST': {'P-224': 2, 'P-256': 2, 'P-384': 2, 'P-521': 2}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 5}, 'other': {'JIL': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.CardAccess': 1}}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 1, 'FIPS PUB 81': 1, 'FIPS PUB 140-2': 1, 'FIPS PUB 180-3': 1, 'FIPS PUB 186-3': 1, 'FIPS PUB 197': 1, 'FIPS 197': 2, 'FIPS 180-2': 3, 'FIPS 186-4': 5, 'FIPS 186': 1}, 'NIST': {'SP 800-90A': 2, 'SP 800-67': 2, 'SP 800-38F': 2, 'SP 800-38B': 1, 'SP 800-108': 2, 'SP 800-56B': 3}, 'PKCS': {'PKCS#1': 3, 'PKCS#15': 4}, 'BSI': {'AIS31': 1, 'AIS 31': 1}, 'ISO': {'ISO/IEC 9796-1': 1, 'ISO/IEC 9797-1': 1, 'ISO/IEC 14443-3': 2, 'ISO/IEC 14443-4': 1, 'ISO/IEC 7816-3': 2, 'ISO/IEC 14443': 4}, 'SCP': {'SCP03': 5}}, 'javacard_version': {'JavaCard': {'Java Card 3.0.4': 1}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {'javacard': {'javacard.ldslib': 1, 'javacard.ldseac': 2, 'javacard.framework': 2}, 'com': {'com.oberthur.javacard.ldslib': 1, 'com.oberthur.javacard.ldseac': 2, 'com.oberthur.sharedpin': 1}}, 'certification_process': {}}
. - The report_filename property was set to
anssi-cc-2017_68fr_mod.pdf
. - The st_filename property was set to
anssi-cc-2017-68-public-security-target.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['CEA']
. - The cert_id property was set to
ANSSI-CC-2017/68
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/47', 'ANSSI-CC-2017/49']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/47', 'ANSSI-CC-2017/49', 'BSI-DSZ-CC-0955-V2-2016']}}
data. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016', 'ANSSI-CC-2017/47']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-2016', 'BSI-DSZ-CC-0973-V2-2016', 'ANSSI-CC-2017/47', 'BSI-DSZ-CC-0955-2016', 'BSI-DSZ-CC-0955-V2-2016']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_68fr_mod.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017-68-public-security-target.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/49']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2017/49']}}}
data. - The report_references property was updated, with the
{'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0973-V2-2016', 'BSI-DSZ-CC-0973-2016']}}}
data.
- The st_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name HICOS PKI Applet on ID-one Cosmo V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N Large Platform on NXP P6022M (version 03 02) was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "847af11000d85e18",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2017/68",
"cert_lab": [
"CEA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"8.1"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/47",
"BSI-DSZ-CC-0973-V2-2016"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/47",
"BSI-DSZ-CC-0973-2016",
"BSI-DSZ-CC-0955-V2-2016",
"BSI-DSZ-CC-0973-V2-2016",
"BSI-DSZ-CC-0955-2016"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2017/68",
"description": "Le produit certifi\u00e9 est \u00ab Hicos PKI Applet on Oberthur Technologies ID-one V8.1, Version 0302 \u00bb d\u00e9velopp\u00e9 par CHUNGHWA TELECOM, IDEMIA et NXP SEMICONDUCTORS GMBH. Ce produit est destin\u00e9 \u00e0 \u00eatre utilis\u00e9 comme dispositif s\u00e9curis\u00e9 de cr\u00e9ation de signature (SSCD, Secure Signature Creation Device). \u0026nbsp;",
"developer": "Chunghwa Telecom (CHT), IDEMIA, NXP Semiconductors GmbH",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r4",
"cert_id": "ANSSI-CC-2017/68",
"certification_date": "2018-02-14",
"developer": "Chunghwa Telecom (CHT), IDEMIA, NXP Semiconductors GmbH",
"evaluation_facility": "CEA - LETI",
"level": "EAL5+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "PP-SSCD-Part2, PP-SSCD-Part3",
"report_link": "https://cyber.gouv.fr/sites/default/files/2018/03/anssi-cc-2017_68fr_mod.pdf",
"sponsor": "IDEMIA",
"target_link": "https://cyber.gouv.fr/sites/default/files/2018/03/anssi-cc-2017-68-public-security-target.pdf"
},
"level": "EAL5+",
"product": "HICOS PKI Applet on ID-one Cosmo V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N Large Platform on NXP P6022M (version 03 02)",
"sponsor": "IDEMIA",
"url": "https://cyber.gouv.fr/produits-certifies/hicos-pki-applet-id-one-cosmo-v81-standard-lds-platform-nxp-p6021m-vb-and-id-one"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2017/49",
"ANSSI-CC-2017/47"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0955-V2-2016",
"ANSSI-CC-2017/49",
"ANSSI-CC-2017/47"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Oberthur Technologies / NXP Semiconductors GmbH",
"manufacturer_web": "https://www.oberthur.com/",
"name": "HICOS PKI Applet on ID-one Cosmo V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N Large Platform on NXP P6022M (version 03 02)",
"not_valid_after": "2023-02-14",
"not_valid_before": "2018-02-14",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "anssi-cc-2017_68fr_mod.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL5 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
"cert_id": "ANSSI-CC-2017/68",
"cert_item": "HICOS PKI Applet on ID-one Cosmo V8.1 - Standard LDS Platform on NXP P6021M VB and on ID-One Cosmo v8.1-N Large Platform on NXP P6022M",
"cert_item_version": "Version 03 02",
"cert_lab": "CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France",
"developer": "Chunghwa Telecom (CHT) N\u00b099 Dianyan Road \u2013 Yangmei Distric, Taiwan Taoyuan City 32661, Taiwan IDEMIA (ex Oberthur Technologies) 420 rue d\u2019Estienne d\u2019Orves, 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101, 22539 Hamburg, Allemagne Commanditaire IDEMIA 420 rue d\u2019Estienne d\u2019Orves, 92700 Colombes, France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.*)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeurs(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "PP-SSCD-Part2] Protection profiles for secure signature creation device - Device with key generation, v2.0.1 ; [PP-SSCD-Part3] Protection profiles for secure signature creation device - Device with key import, v1.0.2"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0955-": 1,
"BSI-DSZ-CC-0955-V2-": 1,
"BSI-DSZ-CC-0973-V2-": 1,
"BSI-DSZ-CC-0973-V2-2016": 1
},
"FR": {
"ANSSI-CC-2017/47": 1,
"ANSSI-CC-2017/68": 16
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0059-2009-MA-01": 1,
"BSI-CC-PP- 0075-2012": 1,
"BSI-PP-0084-2014": 1
},
"other": {
"PP-SSCD-": 3,
"PP-SSCD-Part2": 2,
"PP-SSCD-Part3": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_PRE": 4
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 5
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 2,
"EAL 7": 1,
"EAL2": 2,
"EAL5": 2,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CEA-LETI": {
"CEA - LETI": 1
},
"CESTI": {
"CESTI": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 8
},
"NXP": {
"NXP": 46,
"NXP Semiconductors": 1
},
"Oberthur": {
"OBERTHUR": 2,
"Oberthur Technologies": 3
}
},
"vulnerability": {}
},
"report_metadata": {
"/Category": "R\u00e9f\u00e9rence, Version",
"/Comments": "D\u00e9veloppeur",
"/Company": "SGDSN/ANSSI",
"/CreationDate": "D:20180309163423+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 pour Word",
"/Keywords": "ANSSI-CC-CER-F-07.026",
"/ModDate": "D:20180313142628+01\u002700\u0027",
"/Producer": "Adobe PDF Library 11.0",
"/SourceModified": "D:20180309153419",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 258888,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"mailto:[email protected]",
"http://www.ssi.gouv.fr/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "anssi-cc-2017-68-public-security-target.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 14
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 6
}
},
"FF": {
"DH": {
"DH": 3
}
},
"RSA": {
"RSA 2048": 2
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0955-V2-": 2,
"BSI-DSZ-CC-0973-V2-": 4
},
"FR": {
"ANSSI-CC-2017/47": 2,
"ANSSI-CC-2017/49": 1,
"ANSSI-CC-2017/49-M01": 1,
"ANSSI-CC-2017/49-M1": 1
}
},
"cc_claims": {
"A": {
"A.CGA": 1,
"A.CSP": 1,
"A.SCA": 1
},
"OE": {
"OE.HID_VAD": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.4": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE": 5,
"AGD_OPE.1": 1,
"AGD_PRE": 7,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 9,
"ALC_FLR": 1,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1,
"ASE_TSS.2": 3
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 9
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 1,
"EAL5": 4,
"EAL5+": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 9,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 8,
"FCS_CKM.4.1": 2,
"FCS_COP": 4,
"FCS_COP.1": 18,
"FCS_COP.1.1": 1,
"FCS_RNG": 3,
"FCS_RNG.1": 4,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 7,
"FDP_ACC.1": 21,
"FDP_ACF": 14,
"FDP_ACF.1": 30,
"FDP_ETC.1": 3,
"FDP_IFC.1": 6,
"FDP_ITC": 3,
"FDP_ITC.1": 10,
"FDP_ITC.2": 2,
"FDP_RIP.1": 2,
"FDP_RIP.1.1": 2,
"FDP_SDI": 4,
"FDP_SDI.1": 2,
"FDP_SDI.2": 6,
"FDP_UCT": 4,
"FDP_UCT.1": 1
},
"FIA": {
"FIA_AFL": 3,
"FIA_AFL.1": 4,
"FIA_AFL.1.1": 2,
"FIA_ATD.1": 2,
"FIA_UAU.1": 4,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 5,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 3,
"FMT_MOF.1.1": 1,
"FMT_MSA": 5,
"FMT_MSA.1": 10,
"FMT_MSA.2": 3,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 8,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 3,
"FMT_MSA.4.1": 1,
"FMT_MTD": 8,
"FMT_MTD.1": 12,
"FMT_SMF": 1,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 10,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 7,
"FPT_EMS.1": 5,
"FPT_EMS.1.1": 2,
"FPT_EMS.1.2": 1,
"FPT_FLS.1": 3,
"FPT_FLS.1.1": 1,
"FPT_PHP.1": 3,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 3,
"FPT_PHP.3.1": 1,
"FPT_TST": 1,
"FPT_TST.1": 5,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC.1": 4,
"FTP_TRP.1": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 10
},
"ECB": {
"ECB": 2
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"PACE": {
"PACE": 1
}
},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"P-224": 2,
"P-256": 2,
"P-384": 2,
"P-521": 2
}
},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-224": 1,
"SHA-256": 3,
"SHA-384": 2,
"SHA-512": 4,
"SHA256": 1,
"SHA384": 1,
"SHA512": 1
}
}
},
"ic_data_group": {
"EF": {
"EF.CardAccess": 1
}
},
"javacard_api_const": {},
"javacard_packages": {
"com": {
"com.oberthur.javacard.ldseac": 2,
"com.oberthur.javacard.ldslib": 1,
"com.oberthur.sharedpin": 1
},
"javacard": {
"javacard.framework": 2,
"javacard.ldseac": 2,
"javacard.ldslib": 1
}
},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 1
},
"JavaCard": {
"Java Card 3.0.4": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 2
},
"RNG": {
"RNG": 9
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 5
},
"SCA": {
"DPA": 1,
"SPA": 1,
"timing attacks": 1
},
"other": {
"JIL": 1
}
},
"standard_id": {
"BSI": {
"AIS 31": 1,
"AIS31": 1
},
"FIPS": {
"FIPS 180-2": 3,
"FIPS 186": 1,
"FIPS 186-4": 5,
"FIPS 197": 2,
"FIPS PUB 140-2": 1,
"FIPS PUB 180-3": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 197": 1,
"FIPS PUB 46-3": 1,
"FIPS PUB 81": 1
},
"ISO": {
"ISO/IEC 14443": 4,
"ISO/IEC 14443-3": 2,
"ISO/IEC 14443-4": 1,
"ISO/IEC 7816-3": 2,
"ISO/IEC 9796-1": 1,
"ISO/IEC 9797-1": 1
},
"NIST": {
"SP 800-108": 2,
"SP 800-38B": 1,
"SP 800-38F": 2,
"SP 800-56B": 3,
"SP 800-67": 2,
"SP 800-90A": 2
},
"PKCS": {
"PKCS#1": 3,
"PKCS#15": 4
},
"SCP": {
"SCP03": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 30,
"AES-128": 3,
"AES-192": 2,
"AES-256": 2
}
},
"DES": {
"3DES": {
"TDEA": 1,
"TDES": 1,
"Triple-DES": 2
},
"DES": {
"DES": 8
}
},
"constructions": {
"MAC": {
"CMAC": 7
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 4
},
"Morpho": {
"Morpho": 1
},
"NXP": {
"NXP": 8
},
"Oberthur": {
"OBERTHUR": 4,
"Oberthur": 5,
"Oberthur Technologies": 15
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20180209155337+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20180313142638+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"pdf_file_size_bytes": 1637494,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 82
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_68fr_mod.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"ALC_DVS.2",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017-68-public-security-target.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a06db865e488b3c8bf027863cc0fc10e894071f217897758912373bf4a806363",
"txt_hash": "c8c17b6582c526c5d4fc881e0f977be55ff5b1983aa0d9a48a89cc640f06eccd"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "1880d3e6b83a19511c742309706977575ad6cdd61ad07dd34e514f0e94961ebe",
"txt_hash": "163391a65f232609034349bf85d539f6dfa4727c1bdadab6fae9d626ac9170fe"
}
},
"status": "archived"
}