ACOS-IDv4.1 eMRTD (A) BAC Configuration (version 4.1 eMRTD (A)) ( ANSSI-CC-2025/15)

CSV information

Status active
Valid from 30.03.2025
Valid until 30.03.2030
Scheme 🇫🇷 FR
Manufacturer Austria Card plastikkarten und Ausweissysteme Gmbh
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ADV_TDS.4, ATE_DPT.3, ADV_FSP.5, EAL4+, ADV_INT.2, ALC_CMC.5, ALC_TAT.2, ALC_DVS.2, ALC_FLR.1
Protection profiles

Heuristics summary

Certificate ID: ANSSI-CC-2025/15

Certificate

Extracted keywords

Security level
EAL4, EAL2
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_TDS.4, ADV_INT.2, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2, ALC_DVS.2, ATE_DPT.3
Protection profiles
BSI-PP-0055-2009
Certificates
ANSSI-CC-2025/15
Evaluation facilities
SERMA

File metadata

Creation date D:20250403163926+02'00'
Modification date D:20250403173128+02'00'
Pages 2
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Certification report

Extracted keywords

Symmetric Algorithms
DES

Vendor
Infineon Technologies AG

Security level
EAL4, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_TDS.4, ADV_INT.2, AGD_PRE_OPE, ALC_FLR.1, ALC_CMS.5, ALC_TAT.2, ALC_DVS.2, ALC_FLR, ATE_DPT.3, AVA_VAN
Protection profiles
BSI-PP-0055-2009, BSI-PP-0084-2014, BSI-CC-PP-0055-2009
Certificates
BSI-DSZ-CC-1229-V2-2024, ANSSI-CC-2025/15
Evaluation facilities
SERMA, CESTI

Standards
ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Keywords [ANSSI Crypto]
Creation date D:20250403163818+02'00'
Modification date D:20250403173126+02'00'
Pages 14
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

References

Outgoing
  • BSI-DSZ-CC-1229-V2-2024 - active - IFX_CCI_00007Dh, IFX_CCI_00007Eh, IFX_CCI_00007Fh H11 with optional CryptoSuite

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1
Schemes
MAC
Protocols
PACE
Randomness
RND
Block cipher modes
CBC

IC data groups
EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG5, EF.DG16, EF.DG13, EF.DG14, EF.DG15, EF.COM, EF.SOD
Vendor
Infineon Technologies AG, Infineon

Security level
EAL4+, EAL 6+, EAL4, EAL6, EAL4 augmented, EAL6 augmented
Claims
O.RND, O.AES, O.TDES, O.RSA, O.ECC, O.AES-CMAC, O.TDES-RMAC, O.FFC, OE.MRTD_
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_INT.2, ADV_TDS.4, ADV_ARC.1, ADV_FUN.1, ADV_IMP.1, ADV_TDS.1, ADV_INT.1, ALC_CMS.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.2, ALC_TAT.1, ATE_DPT.3, AVA_VAN.3, AVA_VAN.5, APE_SRE, ASE_INT, ASE_CCL, ASE_SPD, ASE_OBJ, ASE_ECD, ASE_REQ, ASE_COMP.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_GEN, FAU_SAS.1.1, FCS_RND, FCS_RND.1, FCS_CKM.1, FCS_RND.1.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP, FCS_CKM, FCS_RNG, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_UCT.1, FDP_UIT.1, FDP_IFC.1, FDP_UIT.1.2, FDP_ITC, FDP_ITT.1, FDP_ACC.2, FDP_SDI.2, FIA_API, FIA_API.1, FIA_API.1.1, FIA_SOS.2, FIA_UAU.5.2, FIA_UAU.4, FIA_UAU.6, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.6.1, FIA_AFL.1, FIA_AFL.1.2, FIA_AFL.1.1, FIA_UID, FIA_UAU, FMT_LIM, FMT_LIM.1, FMT_LIM.2, FMT_LIM.1.1, FMT_LIM.2.1, FMT_MTD, FMT_MSA.3, FMT_SMF.1, FMT_SMF.1.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MSA.1, FPR_TST.1.1, FPT_FLS.1, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_PHP.3.1, FPT_RVM.1, FPT_SEP.1, FPT_ITT.1, FPT_PHP, FRU_FLT.2, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-CC-PP-0084-2014, BSI-CC-PP-0055-2009, BSI-CC-PP-0056-V2-2012, BSI-PP-0002-2001
Certificates
BSI-DSZ-CC-1229-V2-2024

Side-channel analysis
Leak-Inherent, physical probing, DPA, SPA, timing attacks, Physical Tampering, physical tampering, Physical tampering, malfunction, Malfunction, fault injection, reverse engineering

Standards
FIPS 180-215, FIPS 180-2, FIPS 46-3, FIPS 197, FIPS PUB 46-3, AIS 31, RFC3369, ISO/IEC7816-3, ISO/IEC14443, ISO/IEC 18013, ISO/IEC 18033-3, ISO/IEC 7816-2, ISO/IEC 9796-2, ISO/IEC 14443, ISO/IEC 7816-3, ISO/IEC 7816-4, ISO/IEC 7816-8, ISO/IEC 7816-9, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-03110, BSI TR-03111

File metadata

Author [email protected]
Creation date D:20250114102310+01'00'
Modification date D:20250114102310+01'00'
Pages 87
Creator Microsoft® Word LTSC
Producer Microsoft® Word LTSC

References

Outgoing
  • BSI-DSZ-CC-1229-V2-2024 - active - IFX_CCI_00007Dh, IFX_CCI_00007Eh, IFX_CCI_00007Fh H11 with optional CryptoSuite

Heuristics

Certificate ID: ANSSI-CC-2025/15

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_FUN.1, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ALC_CMC.5, ALC_CMS.5, ALC_DVS.2, ALC_FLR.1, ALC_TAT.2, ASE_COMP.1, ATE_DPT.3, AVA_VAN.5

Similar certificates

Name Certificate ID
ACOS-IDv4.1 eMRTD (A) EAC/PACE Configuration (version 4.1 eMRTD (A)) (ANSSI-CC-2025/16) ANSSI-CC-2025/16 Compare
ACOS-IDv4.1 SSCD (A) CB-Comm (version 4.1 SSCD (A)) (ANSSI-CC-2025/17) ANSSI-CC-2025/17 Compare
ACOS-IDv4.1 SSCD (A) CL-TC-Comm (version 4.1 SSCD (A)) (ANSSI-CC-2025/18) ANSSI-CC-2025/18 Compare
Infineon eID-OSv1.0 eMRTD (A) BAC Configuration (version 1.0 eMRTD (A)) (ANSSI-CC-2025/23) ANSSI-CC-2025/23 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.3.3) (ANSSI-CC-2025/13) ANSSI-CC-2025/13 Compare
Infineon eID-OSv1.0 eMRTD (A) EAC/PACE Configuration (version 1.0 eMRTD (A)) (ANSSI-CC-2025/24) ANSSI-CC-2025/24 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.3.3) (ANSSI-CC-2025/11) ANSSI-CC-2025/11 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO BAC configuration (Version 3.2.0.52)(ANSSI-CC-2025/01) ANSSI-CC-2025/01 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.2.0.52) (ANSSI-CC-2025/02) ANSSI-CC-2025/02 Compare
NPCT7xx TPM2.0 rev 1.59 configuration version 1.5.3.3 (ANSSI-CC-2025/14) ANSSI-CC-2025/14 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.3.3) (ANSSI-CC-2025/12) ANSSI-CC-2025/12 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
ACOS-IDv2.1 eMRTD (A) BAC Configuration(Version 2.1 eMRTD (A)) ANSSI-CC-2022/68 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
IAS Classic V4.4.2 with MOC Server 1.1 on MultiApp V4.1 version IAS : 4.4.2.A, version MOC Server : 1.1.1A (ANSSI-CC-2023/57 ) ANSSI-CC-2023/57 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (Version 3.1.6.52) (ANSSI-CC-2021/18-R01) ANSSI-CC-2021/18-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
PPCA application on MultiApp V5.1 Platform (version 1.0.1.A) (ANSSI-CC-2025/05) ANSSI-CC-2025/05 Compare
ChipDoc v3.2 on JCOP 4 P71 in SSCD configuration (Version 3.2.0.52) (ANSSI-CC-2025/03) ANSSI-CC-2025/03 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
Strong Customer Authentication pour Apple Pay sur iPhone SE (2nde génération) avec A13 Bionic exécutant iOS 15.4.1 (Version 15.4.1 (build 19E258)) ANSSI-CC-2023/15 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.1.6.52) (ANSSI-CC-2021/19-R01) ANSSI-CC-2021/19-R01 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.2.2) (ANSSI-CC-2024/11) ANSSI-CC-2024/11 Compare
eTravel 2.4 en configuration BAC sur plateforme ID Motion V2 (Version de l’application eTravel : 2.4) (ANSSI-CC-2018/36v2-R01) ANSSI-CC-2018/36v2 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (Version 3.1.6.52) (ANSSI-CC-2021/20-R01) ANSSI-CC-2021/20-R01 Compare
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH(Version 4.1.0.2) ( ANSSI-CC-2023/30 ) ANSSI-CC-2023/30 Compare
eTravel 2.4 en configuration EAC BAC sur plateforme ID Motion V2(Version de l’application eTravel : 2.4) ( ANSSI-CC-2018/37v2-R01) ANSSI-CC-2018/37v2 Compare
TEQS V1.0 (version 1.0) (ANSSI-CC-2025/20) ANSSI-CC-2025/20 Compare
Infineon eID-OSv1.0 SSCD (A) CB-Comm (version 1.0 SSCD (A)) (ANSSI-CC-2025/21) ANSSI-CC-2025/21 Compare
Connected eSE 5.3.4 v1.2 Platform (Revision 1.0) (ANSSI-CC-2025/04) ANSSI-CC-2025/04 Compare
Infineon eID-OSv1.0 SSCD (A) CL-TC-Comm (version 1.0 SSCD (A)) (ANSSI-CC-2025/22) ANSSI-CC-2025/22 Compare
Smart Tachograph G2 on MultiApp V4.0.1 (Versions 2.0.1 G et 2.0.1 H) (EUCC-ANSSI-2025-03-02) ANSSI-CC-2025/03 Compare
eTravel 3.1 BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/34 ) ANSSI-CC-2023/34 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2) (ANSSI-CC-2024/09) ANSSI-CC-2024/09 Compare
eTravel 3.1 EAC on BAC on MultiApp V5.1 Version 3.1.0.0 ( ANSSI-CC-2023/35 ) ANSSI-CC-2023/35 Compare
IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/53-R01) ANSSI-CC-2020/53-R01 Compare
eTravel v2.2 BAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/43-R01) ANSSI-CC-2020/43-R01 Compare
ACOS-IDv2.0 eMRTD (B) BAC Configuration (Version 2.0 eMRTD (B)) ANSSI-CC-2022/08 Compare
eTravel v2.2 EAC/BAC on MultiApp v4.0.1 platform with Filter Set 1.0 (version 1.0) (ANSSI-CC-2020/44-R01) ANSSI-CC-2020/44-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (Version 3.1.6.52) ANSSI-CC-2021/18 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration(Version 4.0.1.52) ANSSI-CC-2023/10 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.3.2.2) (ANSSI-CC-2024/10) ANSSI-CC-2024/10 Compare
Strong Customer Authentication pour Apple Pay sur iPhone 13 avec A15 Bionic exécutant iOS 15.4.1 Version 15.4.1 (build 19E258) ANSSI-CC-2023/18 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/54) ANSSI-CC-2023/54 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated (version 2.3.0.1) (ANSSI-CC-2023/56) ANSSI-CC-2023/56 Compare
eTravel 2.4 en configuration EAC SAC sur plateforme ID Motion V2 (Version de l’application eTravel : 2.4) (ANSSI-CC-2018/38v2-R01) ANSSI-CC-2018/38v2 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.1.1) ANSSI-CC-2022/31 Compare
IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l’application : F0 02 02 13) (ANSSI-CC-2020/50-R01) ANSSI-CC-2020/50-R01 Compare
Microcontrôleur sécurisé ST33H768 révision C, Firmware révision 4, incluant optionnellement la bibliothèque cryptographique Neslib version 4.1 et version 4.1.1 ANSSI-CC-2015/36 Compare
TESS v5.2 Platform(Révision 1.0) (ANSSI-CC-2025/19) ANSSI-CC-2025/19 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/56v2 Compare
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1 ANSSI-CC-2018/58v2 Compare
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m JISEC-CC-CRP-C0246 Compare
eTravel EAC version 1.1 avec AA (version 01 03), configuration BAC, sur composant P5CD080 ANSSI-CC-2012/46 Compare
Showing 5 out of 56.

References

Loading...

Updates

  • 21.04.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd7c526c181f65105f62e93f260e776e1c3e7bae6ea08418b49a12049a9f1d3da', 'txt_hash': '9445e938701ed08e967cc7fea0139e5557eb98da0428ae036aa1ebfb9d53dc35'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c022db8ba6ee3a4c3d6f8835a68d8e23287c76b4fea106ed19cd491e52df8125', 'txt_hash': '4d5b02247e3686f219ac64122441232c25111c7140bce25de2d22cccf75a98a7'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '962db8cb8a7e660c9eaef5afdf34f40e62c9a3ae20a76e252a3e963982534f8c', 'txt_hash': '41d6daa8bbdb43d7191ea6a612049172faabe27c8705b54f63c6a5a2c2379a0f'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 294823, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 14, '/CreationDate': "D:20250403163818+02'00'", '/Creator': 'Microsoft® Word 2019', '/Keywords': '[ANSSI Crypto]', '/ModDate': "D:20250403173126+02'00'", '/Producer': 'Microsoft® Word 2019', '/Subject': '', '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'http://www.ssi.gouv.fr/', 'http://www.sogis.eu/', 'mailto:[email protected]']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1697647, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 87, '/Author': '[email protected]', '/Creator': 'Microsoft® Word LTSC', '/CreationDate': "D:20250114102310+01'00'", '/ModDate': "D:20250114102310+01'00'", '/Producer': 'Microsoft® Word LTSC', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 147372, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20250403163926+02'00'", '/Creator': 'Microsoft® Word 2019', '/Keywords': '', '/ModDate': "D:20250403173128+02'00'", '/Producer': 'Microsoft® Word 2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1229-V2-2024': 2}, 'FR': {'ANSSI-CC-2025/15': 3}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0055-2009': 1, 'BSI-PP-0084-2014': 1, 'BSI-CC-PP-0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 2, 'EAL7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 1, 'ADV_TDS.4': 1, 'ADV_INT.2': 1}, 'AGD': {'AGD_PRE_OPE': 2}, 'ALC': {'ALC_FLR.1': 2, 'ALC_CMS.5': 1, 'ALC_TAT.2': 1, 'ALC_DVS.2': 1, 'ALC_FLR': 1}, 'ATE': {'ATE_DPT.3': 1}, 'AVA': {'AVA_VAN': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1}}, 'eval_facility': {'Serma': {'SERMA': 1}, 'CESTI': {'CESTI': 2}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ICAO': {'ICAO': 1}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1229-V2-2024': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 2, 'BSI-CC-PP-0055-2009': 3, 'BSI-CC-PP-0056-V2-2012': 1, 'BSI-PP-0002-2001': 1}}, 'cc_security_level': {'EAL': {'EAL4+': 1, 'EAL 6+': 1, 'EAL4': 16, 'EAL6': 1, 'EAL4 augmented': 2, 'EAL6 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 6, 'ADV_INT.2': 4, 'ADV_TDS.4': 6, 'ADV_ARC.1': 3, 'ADV_FUN.1': 1, 'ADV_IMP.1': 3, 'ADV_TDS.1': 2, 'ADV_INT.1': 1}, 'ALC': {'ALC_CMS.5': 5, 'ALC_DVS.2': 5, 'ALC_FLR.1': 6, 'ALC_TAT.2': 5, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.3': 5}, 'AVA': {'AVA_VAN.3': 1, 'AVA_VAN.5': 1}, 'APE': {'APE_SRE': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_OBJ': 2, 'ASE_ECD': 3, 'ASE_REQ': 2, 'ASE_COMP.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 6, 'FAU_SAS.1': 13, 'FAU_GEN': 1, 'FAU_SAS.1.1': 2}, 'FCS': {'FCS_RND': 7, 'FCS_RND.1': 16, 'FCS_CKM.1': 35, 'FCS_RND.1.1': 2, 'FCS_CKM.2': 4, 'FCS_COP.1': 13, 'FCS_CKM.4': 42, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP': 76, 'FCS_CKM': 28, 'FCS_RNG': 1}, 'FDP': {'FDP_ACF': 1, 'FDP_ITC.1': 12, 'FDP_ITC.2': 12, 'FDP_ACC.1': 20, 'FDP_ACF.1': 12, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 4, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 2, 'FDP_UCT.1': 11, 'FDP_UIT.1': 10, 'FDP_IFC.1': 5, 'FDP_UIT.1.2': 1, 'FDP_ITC': 2, 'FDP_ITT.1': 1, 'FDP_ACC.2': 1, 'FDP_SDI.2': 1}, 'FIA': {'FIA_API': 13, 'FIA_API.1': 5, 'FIA_API.1.1': 1, 'FIA_SOS.2': 1, 'FIA_UAU.5.2': 4, 'FIA_UAU.4': 15, 'FIA_UAU.6': 14, 'FIA_UID.1': 13, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 9, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4.1': 1, 'FIA_UAU.5': 10, 'FIA_UAU.5.1': 1, 'FIA_UAU.6.1': 1, 'FIA_AFL.1': 9, 'FIA_AFL.1.2': 3, 'FIA_AFL.1.1': 2, 'FIA_UID': 1, 'FIA_UAU': 4}, 'FMT': {'FMT_LIM': 8, 'FMT_LIM.1': 26, 'FMT_LIM.2': 22, 'FMT_LIM.1.1': 2, 'FMT_LIM.2.1': 4, 'FMT_MTD': 31, 'FMT_MSA.3': 4, 'FMT_SMF.1': 27, 'FMT_SMF.1.1': 1, 'FMT_SMR.1': 25, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.1': 8, 'FMT_MSA.1': 2}, 'FPR': {'FPR_TST.1.1': 1}, 'FPT': {'FPT_FLS.1': 18, 'FPT_TST.1': 15, 'FPT_PHP.3': 15, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 2, 'FPT_PHP.3.1': 1, 'FPT_RVM.1': 1, 'FPT_SEP.1': 1, 'FPT_ITT.1': 1, 'FPT_PHP': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 7, 'FTP_TRP.1': 5}}, 'cc_claims': {'O': {'O.RND': 1, 'O.AES': 1, 'O.TDES': 1, 'O.RSA': 1, 'O.ECC': 1, 'O.AES-CMAC': 1, 'O.TDES-RMAC': 1, 'O.FFC': 1}, 'OE': {'OE.MRTD_': 2}}, 'vendor': {'Infineon': {'Infineon Technologies AG': 1, 'Infineon': 14}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 16}}, 'DES': {'DES': {'DES': 2}, '3DES': {'Triple-DES': 9, 'TDES': 10}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 2}}, 'FF': {'DH': {'Diffie-Hellman': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 5}}, 'crypto_protocol': {'PACE': {'PACE': 14}}, 'randomness': {'RNG': {'RND': 2}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 1, 'physical probing': 4, 'DPA': 2, 'SPA': 1, 'timing attacks': 1}, 'FI': {'Physical Tampering': 5, 'physical tampering': 1, 'Physical tampering': 1, 'malfunction': 8, 'Malfunction': 4, 'fault injection': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {'BSI': {'BSI TR-03110': 1, 'BSI TR-03111': 2}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 28, 'EF.DG2': 10, 'EF.DG3': 8, 'EF.DG4': 8, 'EF.DG5': 8, 'EF.DG16': 26, 'EF.DG13': 4, 'EF.DG14': 2, 'EF.DG15': 3, 'EF.COM': 9, 'EF.SOD': 9}}, 'standard_id': {'FIPS': {'FIPS 180-215': 1, 'FIPS 180-2': 1, 'FIPS 46-3': 2, 'FIPS 197': 3, 'FIPS PUB 46-3': 1}, 'BSI': {'AIS 31': 1}, 'RFC': {'RFC3369': 1}, 'ISO': {'ISO/IEC7816-3': 1, 'ISO/IEC14443': 2, 'ISO/IEC 18013': 8, 'ISO/IEC 18033-3': 1, 'ISO/IEC 7816-2': 1, 'ISO/IEC 9796-2': 2, 'ISO/IEC 14443': 4, 'ISO/IEC 7816-3': 1, 'ISO/IEC 7816-4': 1, 'ISO/IEC 7816-8': 1, 'ISO/IEC 7816-9': 1}, 'ICAO': {'ICAO': 11}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2025/15': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0055-2009': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 1, 'ADV_TDS.4': 1, 'ADV_INT.2': 1}, 'ALC': {'ALC_FLR.1': 1, 'ALC_CMS.5': 1, 'ALC_TAT.2': 1, 'ALC_DVS.2': 1}, 'ATE': {'ATE_DPT.3': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 2}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to ANSSI-CC-2025_15fr.pdf.
    • The st_filename property was set to ANSSI-cible-CC-2025_15en.pdf.
    • The cert_filename property was set to Certificat-CC-2025_15fr.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2025/15.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1229-V2-2024']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1229-V2-2024']}} data.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1229-V2-2024']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-1229-V2-2024', 'BSI-DSZ-CC-1229-2024']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_COMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}]} values added.
  • 07.04.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name ACOS-IDv4.1 eMRTD (A) BAC Configuration (version 4.1 eMRTD (A)) ( ANSSI-CC-2025/15) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2025_15fr.pdf",
  "dgst": "9283463b43afd3d4",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2025/15",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "60455fc9564e2545"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1229-V2-2024"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1229-2024",
          "BSI-DSZ-CC-1229-V2-2024"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1229-V2-2024"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1229-V2-2024"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Austria Card plastikkarten und Ausweissysteme Gmbh",
  "manufacturer_web": "https://www.austriacard.at/",
  "name": "ACOS-IDv4.1 eMRTD (A) BAC Configuration (version 4.1 eMRTD (A)) ( ANSSI-CC-2025/15)",
  "not_valid_after": "2030-03-30",
  "not_valid_before": "2025-03-30",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Certificat-CC-2025_15fr.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2025/15": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0055-2009": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.5": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "ALC": {
          "ALC_CMS.5": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 1,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_DPT.3": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20250403163926+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "",
      "/ModDate": "D:20250403173128+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "pdf_file_size_bytes": 147372,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "ANSSI-CC-2025_15fr.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1229-V2-2024": 2
        },
        "FR": {
          "ANSSI-CC-2025/15": 3
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055-2009": 1,
          "BSI-PP-0055-2009": 1,
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.5": 1,
          "ADV_INT.2": 1,
          "ADV_TDS.4": 1
        },
        "AGD": {
          "AGD_PRE_OPE": 2
        },
        "ALC": {
          "ALC_CMS.5": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 2,
          "ALC_TAT.2": 1
        },
        "ATE": {
          "ATE_DPT.3": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL4": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 2
        },
        "Serma": {
          "SERMA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "ICAO": {
          "ICAO": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20250403163818+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "[ANSSI Crypto]",
      "/ModDate": "D:20250403173126+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Subject": "",
      "/Title": "",
      "pdf_file_size_bytes": 294823,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "http://www.sogis.eu/",
          "mailto:[email protected]",
          "http://www.ssi.gouv.fr/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_filename": "ANSSI-cible-CC-2025_15en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 3
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1229-V2-2024": 2
        }
      },
      "cc_claims": {
        "O": {
          "O.AES": 1,
          "O.AES-CMAC": 1,
          "O.ECC": 1,
          "O.FFC": 1,
          "O.RND": 1,
          "O.RSA": 1,
          "O.TDES": 1,
          "O.TDES-RMAC": 1
        },
        "OE": {
          "OE.MRTD_": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055-2009": 3,
          "BSI-CC-PP-0056-V2-2012": 1,
          "BSI-CC-PP-0084-2014": 2,
          "BSI-PP-0002-2001": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 3,
          "ADV_FSP.5": 6,
          "ADV_FUN.1": 1,
          "ADV_IMP.1": 3,
          "ADV_INT.1": 1,
          "ADV_INT.2": 4,
          "ADV_TDS.1": 2,
          "ADV_TDS.4": 6
        },
        "ALC": {
          "ALC_CMS.5": 5,
          "ALC_DVS.2": 5,
          "ALC_FLR.1": 6,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 5
        },
        "APE": {
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_COMP.1": 1,
          "ASE_ECD": 3,
          "ASE_INT": 2,
          "ASE_OBJ": 2,
          "ASE_REQ": 2,
          "ASE_SPD": 2
        },
        "ATE": {
          "ATE_DPT.3": 5
        },
        "AVA": {
          "AVA_VAN.3": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6+": 1,
          "EAL4": 16,
          "EAL4 augmented": 2,
          "EAL4+": 1,
          "EAL6": 1,
          "EAL6 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_SAS": 6,
          "FAU_SAS.1": 13,
          "FAU_SAS.1.1": 2
        },
        "FCS": {
          "FCS_CKM": 28,
          "FCS_CKM.1": 35,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 4,
          "FCS_CKM.4": 42,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 76,
          "FCS_COP.1": 13,
          "FCS_RND": 7,
          "FCS_RND.1": 16,
          "FCS_RND.1.1": 2,
          "FCS_RNG": 1
        },
        "FDP": {
          "FDP_ACC.1": 20,
          "FDP_ACC.2": 1,
          "FDP_ACF": 1,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 4,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 5,
          "FDP_ITC": 2,
          "FDP_ITC.1": 12,
          "FDP_ITC.2": 12,
          "FDP_ITT.1": 1,
          "FDP_SDI.2": 1,
          "FDP_UCT.1": 11,
          "FDP_UIT.1": 10,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 9,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 3,
          "FIA_API": 13,
          "FIA_API.1": 5,
          "FIA_API.1.1": 1,
          "FIA_SOS.2": 1,
          "FIA_UAU": 4,
          "FIA_UAU.1": 9,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 15,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.5": 10,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 4,
          "FIA_UAU.6": 14,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 13,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM": 8,
          "FMT_LIM.1": 26,
          "FMT_LIM.1.1": 2,
          "FMT_LIM.2": 22,
          "FMT_LIM.2.1": 4,
          "FMT_MSA.1": 2,
          "FMT_MSA.3": 4,
          "FMT_MTD": 31,
          "FMT_MTD.1": 8,
          "FMT_SMF.1": 27,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 25,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_TST.1.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 18,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 1,
          "FPT_PHP": 1,
          "FPT_PHP.3": 15,
          "FPT_PHP.3.1": 1,
          "FPT_RVM.1": 1,
          "FPT_SEP.1": 1,
          "FPT_TST.1": 15,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 2
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC.1": 7,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 14
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 5
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 9,
          "EF.DG1": 28,
          "EF.DG13": 4,
          "EF.DG14": 2,
          "EF.DG15": 3,
          "EF.DG16": 26,
          "EF.DG2": 10,
          "EF.DG3": 8,
          "EF.DG4": 8,
          "EF.DG5": 8,
          "EF.SOD": 9
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 4,
          "Physical Tampering": 5,
          "Physical tampering": 1,
          "fault injection": 1,
          "malfunction": 8,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 1,
          "SPA": 1,
          "physical probing": 4,
          "timing attacks": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 180-2": 1,
          "FIPS 180-215": 1,
          "FIPS 197": 3,
          "FIPS 46-3": 2,
          "FIPS PUB 46-3": 1
        },
        "ICAO": {
          "ICAO": 11
        },
        "ISO": {
          "ISO/IEC 14443": 4,
          "ISO/IEC 18013": 8,
          "ISO/IEC 18033-3": 1,
          "ISO/IEC 7816-2": 1,
          "ISO/IEC 7816-3": 1,
          "ISO/IEC 7816-4": 1,
          "ISO/IEC 7816-8": 1,
          "ISO/IEC 7816-9": 1,
          "ISO/IEC 9796-2": 2,
          "ISO/IEC14443": 2,
          "ISO/IEC7816-3": 1
        },
        "RFC": {
          "RFC3369": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 16
          }
        },
        "DES": {
          "3DES": {
            "TDES": 10,
            "Triple-DES": 9
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 1,
          "BSI TR-03111": 2
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Infineon": {
          "Infineon": 14,
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "[email protected]",
      "/CreationDate": "D:20250114102310+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word LTSC",
      "/ModDate": "D:20250114102310+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word LTSC",
      "pdf_file_size_bytes": 1697647,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 87
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_15fr.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ADV_TDS.4",
      "ADV_INT.2",
      "ALC_FLR.1",
      "ADV_FSP.5",
      "ALC_TAT.2",
      "ATE_DPT.3",
      "ALC_CMC.5",
      "EAL4+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2025_15en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "962db8cb8a7e660c9eaef5afdf34f40e62c9a3ae20a76e252a3e963982534f8c",
      "txt_hash": "41d6daa8bbdb43d7191ea6a612049172faabe27c8705b54f63c6a5a2c2379a0f"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d7c526c181f65105f62e93f260e776e1c3e7bae6ea08418b49a12049a9f1d3da",
      "txt_hash": "9445e938701ed08e967cc7fea0139e5557eb98da0428ae036aa1ebfb9d53dc35"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c022db8ba6ee3a4c3d6f8835a68d8e23287c76b4fea106ed19cd491e52df8125",
      "txt_hash": "4d5b02247e3686f219ac64122441232c25111c7140bce25de2d22cccf75a98a7"
    }
  },
  "status": "active"
}