Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONE COSMO V7.0.1-R2, version 816
CSV information ?
Status | archived |
---|---|
Valid from | 26.10.2016 |
Valid until | 26.10.2021 |
Scheme | 🇫🇷 FR |
Manufacturer | ERCOM SA. |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL4+, AVA_VAN.5, ALC_DVS.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DESAsymmetric Algorithms
RSA 2048JavaCard versions
Java Card 2.2.2, GlobalPlatform 2.1.1Vendor
NXP Semiconductors, NXP, OBERTHUR, OberthurSecurity level
EAL4, EAL2, EAL5, EAL7, EAL 1, EAL 3, EAL 5, EAL 7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_DVS.2, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN, AVA_VLA.5, ASE_TSS.2, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0035-2007Certificates
BSI-DSZ-CC-0857-V2-2015, ANSSI-CC-2016/69Evaluation facilities
Serma Safety & Security, SERMA, CESTIStandards
PKCS#11File metadata
Title | ANSSI-CC-2016_69fr |
---|---|
Pages | 16 |
Creator | PDFCreator Version 1.2.1 |
Producer | GPL Ghostscript 9.02 |
Frontpage
Certificate ID | ANSSI-CC-2016/69 |
---|---|
Certified item | Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONE COSMO V7.0.1-R2, version 816 |
Certification lab | Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France |
Developer | ERCOM 6, rue Dewoitine 78140 Vélizy France OBERTHUR TECHNOLOGIES 420, rue d’Estienne d’Orves 92700 Colombes France NXP Semiconductors Stresemannallee 101 D-22502 Hamburg Germany Commanditaire ERCOM 6, rue Dewoitine 78140 Vélizy France |
References
Outgoing- BSI-DSZ-CC-0857-V2-2015 - archived - NXP Secure Smart Card Controllers P5CD016/021/041/051 and P5Cx081V1A/ V1A(s)
- ANSSI-CC-2019/38 - active - Cryptosmart SIM card (Version 5.1)
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES-256, HMAC, CBC-MACAsymmetric Algorithms
RSA-2048, DH, Diffie-HellmanHash functions
SHA256Schemes
MACProtocols
VPNRandomness
DRBG, RNGBlock cipher modes
ECB, CBCJavaCard versions
Java Card 2.2.2, Java Card 2.2Vendor
NXP, Oberthur, Oberthur TechnologiesSecurity level
EAL4, EAL4 augmentedClaims
D.PLAINTEXT_DATA, D.USER_STORED_KEYS, D.USER_STORED_DATA, D.SESSION_KEYS, D.USER_SIGNATURE_KEY, D.USER_AUTH_CODE, D.TOE_INTERNAL_DATA, D.APDU_KEYS, D.TOE_INTERNAL_INFORMATION, D.APP_CODE, O.USER_AUTHENTICATION, O.PUK_UNBLOCK, O.STRONG_SECCODE, O.LIMITED_AUTH_NUMBER, O.FUNCTION_ACCESS_CONTROL, O.CRYPTOGRAPHIC_OPERATION, O.STRONG_MUTUAL_AUTHENTICATION, O.KEY_MANAGEMENT, O.PROTECT_SESSION_KEY, O.APDU_ENCRYPTION, O.SENSITIVE_MEMORY_ERASING, O.WIPE, O.EMSEC, O.TAMPER_DETECTION, O.TAMPER_RESISTANCE, O.SENSITIVE_MEMORY_ERASINGENFORCING, O.KEY-MNGT, O.REALLOCATION, O.CIPHER, O.ALARM, O.TRANSACTION, O.SCP, O.OPERATE, O.RESSOURCES, O.PIN-MNGT, O.SECURE_COMPARE, O.SCP_RECOVERY, T.TOE_DATA_CORRUPTION, T.TOE_DATA_COMPROMISE, T.ABUSE_FUNC, T.PHYSICAL, T.MASQUERADE, T.KEY_DERIVE, T.INTERFACE_EAVESDROP, A.TRUSTED_ADMIN, A.TRAINED_ADMIN, A.CONFIGURATION, A.KEY_QUALITY, A.SECURE_KEY_MANAGEMENT, OE.ADMIN, OE.CARD_ADMIN_STATION, OE.KEY_GENERATOR, OE.SECURE_PERSONALIZATION, OE.SECURE_KEY_MANAGEMENT, OE.SECURE_SECCODE_ENTRY, OE.NON_TRIVIAL_SECCODE, OE.HOST_CORRECT_BEHAVIOR, OE.HOST_AUDIT, OE.VERIFICATION, OE.APPLET, OSP, OSP.SYMMETRIC_ENCRYPTION, OSP.RGS_CRYPTO, OSP.MUTUAL_AUTHENTICATION, OSP.KEY_STORAGE, OSP.RSA_PRIVATE_KEY_OPERATION, OSP.LOCAL_AUTHENTICATION, OSP.PUK_UNBLOCK, OSP.DATA_WIPE, OSP.ACCESS_CONTROL, OSP.TOE_AUDIT, OSP.SYMMETRIC_INTEGRITY, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, ADV_IMP.2, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DVS, ALC_CMC, ALC_CMS, ALC_DEL, ALC_FLR, ALC_LCD, ALC_TAT, ALC_DVS.2, ALC_FLR.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, ATE_DPT.1, AVA_VAN.5, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_ARP.1, FAU_ARP, FCS_COP, FCS_COP.1, FCS_CKM.1, FCS_CKM.4, FCS_CKM, FCS_CKM.2, FCS_COP.1.1, FCS_RNG, FCS_CKM.3, FDP_ACC, FDP_ACC.1, FDP_ACF.1, FDP_ACC.2, FDP_ACF, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FDP_ITC, FDP_ETC, FDP_ETC.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_SDI.2, FDP_ROL.1, FDP_IFF, FIA_ATD, FIA_ATD.1, FIA_ATD.1.1, FIA_UAU, FIA_UAU.1, FIA_UID.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.4, FIA_UAU.4.1, FIA_SOS, FIA_SOS.1, FIA_SOS.1.1, FIA_SOS.2, FIA_SOS.2.1, FIA_SOS.2.2, FIA_AFL, FIA_AFL.1, FIA_UID, FIA_USB.1, FMT_MSA.3, FMT_MSA, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_SMR, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF, FMT_SMF.1.1, FMT_MTD, FMT_MTD.1, FMT_MTD.3, FPR_RCV, FPR_UNO.1, FPR_UNO, FPT_TDC.1, FPT_TDC, FPT_TDC.1.1, FPT_TDC.1.2, FPT_PHP, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_TST, FPT_TST.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_RCV, FPT_RVM.1, FPT_SEP.1, FPT_RCV.3, FPT_RCV.4, FPT_AMT.1, FRU_RSA, FRU_RSA.1, FRU_FLT, FRU_FLT.1, FTP_ITC.1, FTP_TRP.1, FTP_TRP, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3Protection profiles
BSI-CC-PP-0045Certificates
BSI-DSZ-CC-0857-V2-2015, ANSSI-CC-2012/71, ANSSI-CC-2012/30Side-channel analysis
physical probing, side channel, SPA, DPA, timing attacks, physical tamperingStandards
FIPS PUB 197, FIPS PUB 180-4, FIPS PUB 198-1, PKCS#1, PKCS #1, PKCS#3, PKCS#11, PKCS #11, PKCS #3, ISO/IEC 7816-4, X.509, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003File metadata
Title | Cryptosmart card 5.1 |
---|---|
Subject | Security Target |
Author | julien.kowalski |
Creation date | D:20161107162613+01'00' |
Modification date | D:20161107162613+01'00' |
Pages | 92 |
Creator | Microsoft® Word 2013 |
Producer | Microsoft® Word 2013 |
References
Outgoing- BSI-DSZ-CC-0857-V2-2015 - archived - NXP Secure Smart Card Controllers P5CD016/021/041/051 and P5Cx081V1A/ V1A(s)
- ANSSI-CC-2012/71 - archived - Cryptosmart card v5.0 sur plateforme Oberthur ID-One Cosmo v7.0.1-n avec correctif 077121
- ANSSI-CC-2012/30 - archived - ID-ONE Cosmo V7.0.1-n Smartcard with patch 077121 on NXP P5CD081 V1A (Standard Dual), P5CC081 V1A (Standard) and P5CD041 V1A (Basic Dual) components
Heuristics ?
Extracted SARs
ADV_TDS.3, AGD_OPE.1, AVA_VLA.5, ADV_ARC.1, ALC_FLR.3, AGD_PRE.1, ALC_DVS.2, ATE_DPT.1, ASE_TSS.2, AVA_VAN.5, ADV_IMP.2, ADV_FSP.4Similar certificates
Scheme data ?
Product | Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONE COSMO V7.0.1-R2, version 816 | |
---|---|---|
Url | https://cyber.gouv.fr/produits-certifies/cryptosmart-card-applet-v51-sur-la-plateforme-oberthur-id-one-cosmo-v701-r2 | |
Description | Le produit certifié est « Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONECOSMO V7.0.1-R2, version 816 ». Ce produit conçu, développé et pré-personnalisé par les sociétés NXP, OBERTHURTECHNOLOGIES et ERCOM, est destiné à être utilisé pour établir un canal sécurisé (authentification et négociation de clés partagées) avec un autre produit distant contenantl’applet CRYPTOSMART. Ce | |
Sponsor | ERCOM | |
Developer | ERCOM, OBERTHUR TECHNOLOGIES, NXP Semiconductors | |
Cert Id | ANSSI-CC-2016/69 | |
Level | EAL4+ | |
Enhanced | ||
Cert Id | ANSSI-CC-2016/69 | |
Certification Date | 26.10.2016 | |
Category | Cartes Ă puce | |
Cc Version | Critères Communs version 3.1r4 | |
Developer | ERCOM, OBERTHUR TECHNOLOGIES, NXP Semiconductors | |
Sponsor | ERCOM | |
Evaluation Facility | Serma Safety & Security | |
Level | EAL4+ | |
Protection Profile | ||
Mutual Recognition | SOG-IS CCRA | |
Augmented | ALC_DVS.2, AVA_VAN.5 | |
Report Link | https://cyber.gouv.fr/sites/default/files/2016/11/anssi-cc-2016_69fr.pdf | |
Target Link | https://cyber.gouv.fr/sites/default/files/2016/11/cible-lite_2016_69.pdf |
References ?
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONE COSMO V7.0.1-R2, version 816', 'url': 'https://cyber.gouv.fr/produits-certifies/cryptosmart-card-applet-v51-sur-la-plateforme-oberthur-id-one-cosmo-v701-r2', 'description': 'Le produit certifié est « Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONECOSMO V7.0.1-R2, version 816 ». Ce produit conçu, développé et pré-personnalisé par les sociétés NXP, OBERTHURTECHNOLOGIES et ERCOM, est destiné à être utilisé pour établir un canal sécurisé (authentification et négociation de clés partagées) avec un autre produit distant contenantl’applet CRYPTOSMART. Ce', 'sponsor': 'ERCOM', 'developer': 'ERCOM, OBERTHUR TECHNOLOGIES, NXP Semiconductors', 'cert_id': 'ANSSI-CC-2016/69', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2016/69', 'certification_date': '2016-10-26', 'category': 'Cartes à puce', 'cc_version': 'Critères Communs version 3.1r4', 'developer': 'ERCOM, OBERTHUR TECHNOLOGIES, NXP Semiconductors', 'sponsor': 'ERCOM', 'evaluation_facility': 'Serma Safety & Security', 'level': 'EAL4+', 'protection_profile': '', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ALC_DVS.2, AVA_VAN.5', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2016/11/anssi-cc-2016_69fr.pdf', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2016/11/cible-lite_2016_69.pdf'}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1dcdd8e06a3b058963337275716ee32df3d421fedd700031251e8e3ebcf1f4d6', 'txt_hash': '97863016897108e22b9e25a1867ea1b87daaf0acb1405b440157017e5ea8803c'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bb2c4f0d7bc96f076d8b462e8ab3eb786e6f11269bf11fb6869420002395ee71', 'txt_hash': '0e1c710a30a0122230adf920ace9193ca14122305f299fc075fbc44ba31eb507'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 391988, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/Producer': 'GPL Ghostscript 9.02', '/CreationDate': '', '/ModDate': '', '/Title': 'ANSSI-CC-2016_69fr', '/Creator': 'PDFCreator Version 1.2.1', '/Author': '', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 2770686, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 92, '/Title': 'Cryptosmart card 5.1', '/Author': 'julien.kowalski', '/Subject': 'Security Target', '/Creator': 'Microsoft® Word\xa02013', '/CreationDate': "D:20161107162613+01'00'", '/ModDate': "D:20161107162613+01'00'", '/Producer': 'Microsoft® Word\xa02013', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.ssi.gouv.fr/site_article38.html']}}
. - The report_frontpage property was set to
{'FR': {'match_rules': ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables'], 'cert_id': 'ANSSI-CC-2016/69', 'cert_item': 'Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONE COSMO V7.0.1-R2, version 816', 'cert_item_version': 'V5.1', 'ref_protection_profiles': 'Aucun', 'cc_version': 'Critères Communs version 3.1 révision 4', 'cc_security_level': 'EAL4 augmenté ALC_DVS.2, AVA_VAN.5', 'developer': 'ERCOM 6, rue Dewoitine 78140 Vélizy France OBERTHUR TECHNOLOGIES 420, rue d’Estienne d’Orves 92700 Colombes France NXP Semiconductors Stresemannallee 101 D-22502 Hamburg Germany Commanditaire ERCOM 6, rue Dewoitine 78140 Vélizy France', 'cert_lab': 'Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0857-V2-2015': 1}, 'FR': {'ANSSI-CC-2016/69': 17}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 1}}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL2': 2, 'EAL5': 1, 'EAL7': 1, 'EAL 1': 1, 'EAL 3': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E6 Elevé': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_DVS.2': 3, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 5, 'AVA_VAN': 2, 'AVA_VLA.5': 1}, 'ASE': {'ASE_TSS.2': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP Semiconductors': 1, 'NXP': 11}, 'Oberthur': {'OBERTHUR': 8, 'Oberthur': 15}}, 'eval_facility': {'Serma': {'Serma Safety & Security': 1, 'SERMA': 2}, 'CESTI': {'CESTI': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 2}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#11': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 1}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0857-V2-2015': 1}, 'FR': {'ANSSI-CC-2012/71': 1, 'ANSSI-CC-2012/30': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0045': 1}}, 'cc_security_level': {'EAL': {'EAL4': 4, 'EAL4 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC': 2, 'ADV_FSP': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_SPM': 1, 'ADV_TDS': 2, 'ADV_IMP.2': 1, 'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_TDS.3': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_OPE': 2, 'AGD_PRE': 2, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS': 5, 'ALC_CMC': 2, 'ALC_CMS': 2, 'ALC_DEL': 2, 'ALC_FLR': 1, 'ALC_LCD': 2, 'ALC_TAT': 2, 'ALC_DVS.2': 2, 'ALC_FLR.3': 1}, 'ATE': {'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.5': 4, 'AVA_VAN': 2}, 'ASE': {'ASE_CCL': 2, 'ASE_ECD': 2, 'ASE_INT': 2, 'ASE_OBJ': 2, 'ASE_REQ': 2, 'ASE_SPD': 2, 'ASE_TSS': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 6, 'FAU_ARP': 2}, 'FCS': {'FCS_COP': 14, 'FCS_COP.1': 45, 'FCS_CKM.1': 20, 'FCS_CKM.4': 25, 'FCS_CKM': 2, 'FCS_CKM.2': 3, 'FCS_COP.1.1': 2, 'FCS_RNG': 3, 'FCS_CKM.3': 1}, 'FDP': {'FDP_ACC': 16, 'FDP_ACC.1': 18, 'FDP_ACF.1': 14, 'FDP_ACC.2': 6, 'FDP_ACF': 21, 'FDP_IFC.1': 12, 'FDP_ITC.1': 8, 'FDP_ITC.2': 10, 'FDP_ITC': 20, 'FDP_ETC': 8, 'FDP_ETC.1': 2, 'FDP_RIP': 6, 'FDP_RIP.1': 25, 'FDP_ROL': 2, 'FDP_SDI.2': 1, 'FDP_ROL.1': 4, 'FDP_IFF': 1}, 'FIA': {'FIA_ATD': 1, 'FIA_ATD.1': 9, 'FIA_ATD.1.1': 1, 'FIA_UAU': 2, 'FIA_UAU.1': 12, 'FIA_UID.1': 3, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5': 8, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.4': 6, 'FIA_UAU.4.1': 1, 'FIA_SOS': 1, 'FIA_SOS.1': 7, 'FIA_SOS.1.1': 1, 'FIA_SOS.2': 7, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_AFL': 6, 'FIA_AFL.1': 14, 'FIA_UID': 6, 'FIA_USB.1': 1}, 'FMT': {'FMT_MSA.3': 9, 'FMT_MSA': 35, 'FMT_MSA.1': 6, 'FMT_SMR.1': 19, 'FMT_SMF.1': 14, 'FMT_SMR': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF': 1, 'FMT_SMF.1.1': 1, 'FMT_MTD': 3, 'FMT_MTD.1': 1, 'FMT_MTD.3': 1}, 'FPR': {'FPR_RCV': 1, 'FPR_UNO.1': 4, 'FPR_UNO': 4}, 'FPT': {'FPT_TDC.1': 10, 'FPT_TDC': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_PHP': 5, 'FPT_PHP.1': 7, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_TST': 3, 'FPT_TST.1': 8, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_FLS': 4, 'FPT_FLS.1': 11, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 7, 'FPT_PHP.3.1': 1, 'FPT_RCV': 3, 'FPT_RVM.1': 3, 'FPT_SEP.1': 2, 'FPT_RCV.3': 4, 'FPT_RCV.4': 2, 'FPT_AMT.1': 1}, 'FRU': {'FRU_RSA': 1, 'FRU_RSA.1': 2, 'FRU_FLT': 2, 'FRU_FLT.1': 1}, 'FTP': {'FTP_ITC.1': 2, 'FTP_TRP.1': 10, 'FTP_TRP': 1, 'FTP_TRP.1.1': 1, 'FTP_TRP.1.2': 1, 'FTP_TRP.1.3': 1}}, 'cc_claims': {'D': {'D.PLAINTEXT_DATA': 4, 'D.USER_STORED_KEYS': 6, 'D.USER_STORED_DATA': 4, 'D.SESSION_KEYS': 5, 'D.USER_SIGNATURE_KEY': 7, 'D.USER_AUTH_CODE': 6, 'D.TOE_INTERNAL_DATA': 6, 'D.APDU_KEYS': 5, 'D.TOE_INTERNAL_INFORMATION': 2, 'D.APP_CODE': 3}, 'O': {'O.USER_AUTHENTICATION': 8, 'O.PUK_UNBLOCK': 6, 'O.STRONG_SECCODE': 8, 'O.LIMITED_AUTH_NUMBER': 6, 'O.FUNCTION_ACCESS_CONTROL': 9, 'O.CRYPTOGRAPHIC_OPERATION': 12, 'O.STRONG_MUTUAL_AUTHENTICATION': 8, 'O.KEY_MANAGEMENT': 8, 'O.PROTECT_SESSION_KEY': 7, 'O.APDU_ENCRYPTION': 7, 'O.SENSITIVE_MEMORY_ERASING': 6, 'O.WIPE': 5, 'O.EMSEC': 8, 'O.TAMPER_DETECTION': 6, 'O.TAMPER_RESISTANCE': 8, 'O.SENSITIVE_MEMORY_ERASINGENFORCING': 1, 'O.KEY-MNGT': 2, 'O.REALLOCATION': 2, 'O.CIPHER': 2, 'O.ALARM': 2, 'O.TRANSACTION': 2, 'O.SCP': 4, 'O.OPERATE': 1, 'O.RESSOURCES': 1, 'O.PIN-MNGT': 1, 'O.SECURE_COMPARE': 1, 'O.SCP_RECOVERY': 1}, 'T': {'T.TOE_DATA_CORRUPTION': 3, 'T.TOE_DATA_COMPROMISE': 2, 'T.ABUSE_FUNC': 3, 'T.PHYSICAL': 3, 'T.MASQUERADE': 3, 'T.KEY_DERIVE': 2, 'T.INTERFACE_EAVESDROP': 3}, 'A': {'A.TRUSTED_ADMIN': 3, 'A.TRAINED_ADMIN': 2, 'A.CONFIGURATION': 3, 'A.KEY_QUALITY': 2, 'A.SECURE_KEY_MANAGEMENT': 2}, 'OE': {'OE.ADMIN': 4, 'OE.CARD_ADMIN_STATION': 4, 'OE.KEY_GENERATOR': 4, 'OE.SECURE_PERSONALIZATION': 3, 'OE.SECURE_KEY_MANAGEMENT': 3, 'OE.SECURE_SECCODE_ENTRY': 2, 'OE.NON_TRIVIAL_SECCODE': 2, 'OE.HOST_CORRECT_BEHAVIOR': 4, 'OE.HOST_AUDIT': 3, 'OE.VERIFICATION': 1, 'OE.APPLET': 1}, 'OSP': {'OSP': 1, 'OSP.SYMMETRIC_ENCRYPTION': 4, 'OSP.RGS_CRYPTO': 3, 'OSP.MUTUAL_AUTHENTICATION': 2, 'OSP.KEY_STORAGE': 3, 'OSP.RSA_PRIVATE_KEY_OPERATION': 2, 'OSP.LOCAL_AUTHENTICATION': 3, 'OSP.PUK_UNBLOCK': 2, 'OSP.DATA_WIPE': 3, 'OSP.ACCESS_CONTROL': 2, 'OSP.TOE_AUDIT': 3, 'OSP.SYMMETRIC_INTEGRITY': 2, 'OSP.VERIFICATION': 1}}, 'vendor': {'NXP': {'NXP': 7}, 'Oberthur': {'Oberthur': 4, 'Oberthur Technologies': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 22, 'AES-256': 1}}, 'constructions': {'MAC': {'HMAC': 5, 'CBC-MAC': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-2048': 2}, 'FF': {'DH': {'DH': 5, 'Diffie-Hellman': 5}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 5}}}, 'crypto_scheme': {'MAC': {'MAC': 12}}, 'crypto_protocol': {'VPN': {'VPN': 2}}, 'randomness': {'PRNG': {'DRBG': 1}, 'RNG': {'RNG': 1}}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side channel': 5, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 7}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 2, 'FIPS PUB 180-4': 3, 'FIPS PUB 198-1': 3}, 'PKCS': {'PKCS#1': 12, 'PKCS #1': 3, 'PKCS#3': 1, 'PKCS#11': 8, 'PKCS #11': 1, 'PKCS #3': 1}, 'ISO': {'ISO/IEC 7816-4': 1}, 'X509': {'X.509': 1}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.2': 1, 'Java Card 2.2': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
ANSSI-CC-2016_69fr.pdf
. - The st_filename property was set to
Cible-lite_2016_69.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['SERMA']
. - The cert_id property was set to
ANSSI-CC-2016/69
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0857-V2-2015', 'ANSSI-CC-2012/30', 'ANSSI-CC-2012/71']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['ANSSI-CC-2012/30', 'BSI-DSZ-CC-0857-V2-2015', 'BSI-DSZ-CC-0555-2009', 'ANSSI-CC-2012/71']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2019/38']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2019/38']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0857-V2-2015']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0857-2013', 'BSI-DSZ-CC-0555-2009', 'BSI-DSZ-CC-0857-V2-2015']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_69fr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-lite_2016_69.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0555-2009']}}}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0555-2009']}}}
data.
- The st_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONE COSMO V7.0.1-R2, version 816 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "9c61ce98b4f287da",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2016/69",
"cert_lab": [
"SERMA"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"7.0.1",
"5.1"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/38"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0857-V2-2015"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/38"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0555-2009",
"BSI-DSZ-CC-0857-V2-2015",
"BSI-DSZ-CC-0857-2013"
]
}
},
"scheme_data": {
"cert_id": "ANSSI-CC-2016/69",
"description": "Le produit certifi\u00e9 est \u00ab Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONECOSMO V7.0.1-R2, version 816 \u00bb. Ce produit con\u00e7u, d\u00e9velopp\u00e9 et pr\u00e9-personnalis\u00e9 par les soci\u00e9t\u00e9s NXP, OBERTHURTECHNOLOGIES et ERCOM, est destin\u00e9 \u00e0 \u00eatre utilis\u00e9 pour \u00e9tablir un canal s\u00e9curis\u00e9 (authentification et n\u00e9gociation de cl\u00e9s partag\u00e9es) avec un autre produit distant contenantl\u2019applet CRYPTOSMART. Ce",
"developer": "ERCOM, OBERTHUR TECHNOLOGIES, NXP Semiconductors",
"enhanced": {
"augmented": "ALC_DVS.2, AVA_VAN.5",
"category": "Cartes \u00e0 puce",
"cc_version": "Crit\u00e8res Communs version 3.1r4",
"cert_id": "ANSSI-CC-2016/69",
"certification_date": "2016-10-26",
"developer": "ERCOM, OBERTHUR TECHNOLOGIES, NXP Semiconductors",
"evaluation_facility": "Serma Safety \u0026 Security",
"level": "EAL4+",
"mutual_recognition": "SOG-IS CCRA",
"protection_profile": "",
"report_link": "https://cyber.gouv.fr/sites/default/files/2016/11/anssi-cc-2016_69fr.pdf",
"sponsor": "ERCOM",
"target_link": "https://cyber.gouv.fr/sites/default/files/2016/11/cible-lite_2016_69.pdf"
},
"level": "EAL4+",
"product": "Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONE COSMO V7.0.1-R2, version 816",
"sponsor": "ERCOM",
"url": "https://cyber.gouv.fr/produits-certifies/cryptosmart-card-applet-v51-sur-la-plateforme-oberthur-id-one-cosmo-v701-r2"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0857-V2-2015",
"ANSSI-CC-2012/30",
"ANSSI-CC-2012/71"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0555-2009",
"BSI-DSZ-CC-0857-V2-2015",
"ANSSI-CC-2012/30",
"ANSSI-CC-2012/71"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "ERCOM SA.",
"manufacturer_web": "https://www.ercom.fr",
"name": "Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONE COSMO V7.0.1-R2, version 816",
"not_valid_after": "2021-10-26",
"not_valid_before": "2016-10-26",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "ANSSI-CC-2016_69fr.pdf",
"report_frontpage": {
"FR": {
"cc_security_level": "EAL4 augment\u00e9 ALC_DVS.2, AVA_VAN.5",
"cc_version": "Crit\u00e8res Communs version 3.1 r\u00e9vision 4",
"cert_id": "ANSSI-CC-2016/69",
"cert_item": "Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONE COSMO V7.0.1-R2, version 816",
"cert_item_version": "V5.1",
"cert_lab": "Serma Safety \u0026 Security 14 rue Galil\u00e9e, CS 10055, 33615 Pessac Cedex, France",
"developer": "ERCOM 6, rue Dewoitine 78140 V\u00e9lizy France OBERTHUR TECHNOLOGIES 420, rue d\u2019Estienne d\u2019Orves 92700 Colombes France NXP Semiconductors Stresemannallee 101 D-22502 Hamburg Germany Commanditaire ERCOM 6, rue Dewoitine 78140 V\u00e9lizy France",
"match_rules": [
"R\u00e9f\u00e9rence du rapport de certification(.+)Nom du produit(.+)R\u00e9f\u00e9rence/version du produit(.+)Conformit\u00e9 \u00e0 un profil de protection(.+)Crit\u00e8res d\u2019\u00e9valuation et version(.+)Niveau d\u2019\u00e9valuation(.+)D\u00e9veloppeur\\(s\\)(.+)Centre d\u2019\u00e9valuation(.+)Accords de reconnaissance applicables"
],
"ref_protection_profiles": "Aucun"
}
},
"report_keywords": {
"asymmetric_crypto": {
"RSA": {
"RSA 2048": 2
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0857-V2-2015": 1
},
"FR": {
"ANSSI-CC-2016/69": 17
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_FSP": 1,
"ADV_IMP": 1,
"ADV_INT": 1,
"ADV_SPM": 1,
"ADV_TDS": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1,
"ALC_DEL": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_TAT": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_REQ": 1,
"ASE_SPD": 1,
"ASE_TSS": 1,
"ASE_TSS.2": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_DPT": 1,
"ATE_FUN": 1,
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 5,
"AVA_VLA.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 3": 1,
"EAL 5": 1,
"EAL 7": 1,
"EAL2": 2,
"EAL4": 2,
"EAL5": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"CESTI": {
"CESTI": 1
},
"Serma": {
"SERMA": 2,
"Serma Safety \u0026 Security": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 1
},
"JavaCard": {
"Java Card 2.2.2": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"PKCS": {
"PKCS#11": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 11,
"NXP Semiconductors": 1
},
"Oberthur": {
"OBERTHUR": 8,
"Oberthur": 15
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "",
"/CreationDate": "",
"/Creator": "PDFCreator Version 1.2.1",
"/Keywords": "",
"/ModDate": "",
"/Producer": "GPL Ghostscript 9.02",
"/Subject": "",
"/Title": "ANSSI-CC-2016_69fr",
"pdf_file_size_bytes": 391988,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "Cible-lite_2016_69.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"FF": {
"DH": {
"DH": 5,
"Diffie-Hellman": 5
}
},
"RSA": {
"RSA-2048": 2
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0857-V2-2015": 1
},
"FR": {
"ANSSI-CC-2012/30": 1,
"ANSSI-CC-2012/71": 1
}
},
"cc_claims": {
"A": {
"A.CONFIGURATION": 3,
"A.KEY_QUALITY": 2,
"A.SECURE_KEY_MANAGEMENT": 2,
"A.TRAINED_ADMIN": 2,
"A.TRUSTED_ADMIN": 3
},
"D": {
"D.APDU_KEYS": 5,
"D.APP_CODE": 3,
"D.PLAINTEXT_DATA": 4,
"D.SESSION_KEYS": 5,
"D.TOE_INTERNAL_DATA": 6,
"D.TOE_INTERNAL_INFORMATION": 2,
"D.USER_AUTH_CODE": 6,
"D.USER_SIGNATURE_KEY": 7,
"D.USER_STORED_DATA": 4,
"D.USER_STORED_KEYS": 6
},
"O": {
"O.ALARM": 2,
"O.APDU_ENCRYPTION": 7,
"O.CIPHER": 2,
"O.CRYPTOGRAPHIC_OPERATION": 12,
"O.EMSEC": 8,
"O.FUNCTION_ACCESS_CONTROL": 9,
"O.KEY-MNGT": 2,
"O.KEY_MANAGEMENT": 8,
"O.LIMITED_AUTH_NUMBER": 6,
"O.OPERATE": 1,
"O.PIN-MNGT": 1,
"O.PROTECT_SESSION_KEY": 7,
"O.PUK_UNBLOCK": 6,
"O.REALLOCATION": 2,
"O.RESSOURCES": 1,
"O.SCP": 4,
"O.SCP_RECOVERY": 1,
"O.SECURE_COMPARE": 1,
"O.SENSITIVE_MEMORY_ERASING": 6,
"O.SENSITIVE_MEMORY_ERASINGENFORCING": 1,
"O.STRONG_MUTUAL_AUTHENTICATION": 8,
"O.STRONG_SECCODE": 8,
"O.TAMPER_DETECTION": 6,
"O.TAMPER_RESISTANCE": 8,
"O.TRANSACTION": 2,
"O.USER_AUTHENTICATION": 8,
"O.WIPE": 5
},
"OE": {
"OE.ADMIN": 4,
"OE.APPLET": 1,
"OE.CARD_ADMIN_STATION": 4,
"OE.HOST_AUDIT": 3,
"OE.HOST_CORRECT_BEHAVIOR": 4,
"OE.KEY_GENERATOR": 4,
"OE.NON_TRIVIAL_SECCODE": 2,
"OE.SECURE_KEY_MANAGEMENT": 3,
"OE.SECURE_PERSONALIZATION": 3,
"OE.SECURE_SECCODE_ENTRY": 2,
"OE.VERIFICATION": 1
},
"OSP": {
"OSP": 1,
"OSP.ACCESS_CONTROL": 2,
"OSP.DATA_WIPE": 3,
"OSP.KEY_STORAGE": 3,
"OSP.LOCAL_AUTHENTICATION": 3,
"OSP.MUTUAL_AUTHENTICATION": 2,
"OSP.PUK_UNBLOCK": 2,
"OSP.RGS_CRYPTO": 3,
"OSP.RSA_PRIVATE_KEY_OPERATION": 2,
"OSP.SYMMETRIC_ENCRYPTION": 4,
"OSP.SYMMETRIC_INTEGRITY": 2,
"OSP.TOE_AUDIT": 3,
"OSP.VERIFICATION": 1
},
"T": {
"T.ABUSE_FUNC": 3,
"T.INTERFACE_EAVESDROP": 3,
"T.KEY_DERIVE": 2,
"T.MASQUERADE": 3,
"T.PHYSICAL": 3,
"T.TOE_DATA_COMPROMISE": 2,
"T.TOE_DATA_CORRUPTION": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0045": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 2,
"ADV_ARC.1": 1,
"ADV_FSP": 2,
"ADV_FSP.4": 1,
"ADV_IMP": 2,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 2,
"ADV_SPM": 1,
"ADV_TDS": 2,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 1,
"AGD_PRE": 2,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 2,
"ALC_CMS": 2,
"ALC_DEL": 2,
"ALC_DVS": 5,
"ALC_DVS.2": 2,
"ALC_FLR": 1,
"ALC_FLR.3": 1,
"ALC_LCD": 2,
"ALC_TAT": 2
},
"ASE": {
"ASE_CCL": 2,
"ASE_ECD": 2,
"ASE_INT": 2,
"ASE_OBJ": 2,
"ASE_REQ": 2,
"ASE_SPD": 2,
"ASE_TSS": 2
},
"ATE": {
"ATE_COV": 2,
"ATE_DPT": 2,
"ATE_DPT.1": 1,
"ATE_FUN": 2,
"ATE_IND": 2
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.5": 4
}
},
"cc_security_level": {
"EAL": {
"EAL4": 4,
"EAL4 augmented": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP": 2,
"FAU_ARP.1": 6
},
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.1": 20,
"FCS_CKM.2": 3,
"FCS_CKM.3": 1,
"FCS_CKM.4": 25,
"FCS_COP": 14,
"FCS_COP.1": 45,
"FCS_COP.1.1": 2,
"FCS_RNG": 3
},
"FDP": {
"FDP_ACC": 16,
"FDP_ACC.1": 18,
"FDP_ACC.2": 6,
"FDP_ACF": 21,
"FDP_ACF.1": 14,
"FDP_ETC": 8,
"FDP_ETC.1": 2,
"FDP_IFC.1": 12,
"FDP_IFF": 1,
"FDP_ITC": 20,
"FDP_ITC.1": 8,
"FDP_ITC.2": 10,
"FDP_RIP": 6,
"FDP_RIP.1": 25,
"FDP_ROL": 2,
"FDP_ROL.1": 4,
"FDP_SDI.2": 1
},
"FIA": {
"FIA_AFL": 6,
"FIA_AFL.1": 14,
"FIA_ATD": 1,
"FIA_ATD.1": 9,
"FIA_ATD.1.1": 1,
"FIA_SOS": 1,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_SOS.2": 7,
"FIA_SOS.2.1": 1,
"FIA_SOS.2.2": 1,
"FIA_UAU": 2,
"FIA_UAU.1": 12,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 6,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 8,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID": 6,
"FIA_UID.1": 3,
"FIA_USB.1": 1
},
"FMT": {
"FMT_MSA": 35,
"FMT_MSA.1": 6,
"FMT_MSA.3": 9,
"FMT_MTD": 3,
"FMT_MTD.1": 1,
"FMT_MTD.3": 1,
"FMT_SMF": 1,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 1,
"FMT_SMR": 1,
"FMT_SMR.1": 19,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_RCV": 1,
"FPR_UNO": 4,
"FPR_UNO.1": 4
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS": 4,
"FPT_FLS.1": 11,
"FPT_FLS.1.1": 1,
"FPT_PHP": 5,
"FPT_PHP.1": 7,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 7,
"FPT_PHP.3.1": 1,
"FPT_RCV": 3,
"FPT_RCV.3": 4,
"FPT_RCV.4": 2,
"FPT_RVM.1": 3,
"FPT_SEP.1": 2,
"FPT_TDC": 1,
"FPT_TDC.1": 10,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1,
"FPT_TST": 3,
"FPT_TST.1": 8,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FRU": {
"FRU_FLT": 2,
"FRU_FLT.1": 1,
"FRU_RSA": 1,
"FRU_RSA.1": 2
},
"FTP": {
"FTP_ITC.1": 2,
"FTP_TRP": 1,
"FTP_TRP.1": 10,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 2
},
"ECB": {
"ECB": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"VPN": {
"VPN": 2
}
},
"crypto_scheme": {
"MAC": {
"MAC": 12
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 5
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"JavaCard": {
"Java Card 2.2": 1,
"Java Card 2.2.2": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 1
},
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 7
},
"SCA": {
"DPA": 1,
"SPA": 1,
"physical probing": 1,
"side channel": 5,
"timing attacks": 1
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1
},
"FIPS": {
"FIPS PUB 180-4": 3,
"FIPS PUB 197": 2,
"FIPS PUB 198-1": 3
},
"ISO": {
"ISO/IEC 7816-4": 1
},
"PKCS": {
"PKCS #1": 3,
"PKCS #11": 1,
"PKCS #3": 1,
"PKCS#1": 12,
"PKCS#11": 8,
"PKCS#3": 1
},
"X509": {
"X.509": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 22,
"AES-256": 1
}
},
"constructions": {
"MAC": {
"CBC-MAC": 1,
"HMAC": 5
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 7
},
"Oberthur": {
"Oberthur": 4,
"Oberthur Technologies": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "julien.kowalski",
"/CreationDate": "D:20161107162613+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Word\u00a02013",
"/ModDate": "D:20161107162613+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Word\u00a02013",
"/Subject": "Security Target",
"/Title": "Cryptosmart card 5.1",
"pdf_file_size_bytes": 2770686,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/site_article38.html"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 92
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_69fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-lite_2016_69.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "1dcdd8e06a3b058963337275716ee32df3d421fedd700031251e8e3ebcf1f4d6",
"txt_hash": "97863016897108e22b9e25a1867ea1b87daaf0acb1405b440157017e5ea8803c"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "bb2c4f0d7bc96f076d8b462e8ab3eb786e6f11269bf11fb6869420002395ee71",
"txt_hash": "0e1c710a30a0122230adf920ace9193ca14122305f299fc075fbc44ba31eb507"
}
},
"status": "archived"
}