BelPIC V1.8 on MultiApp V5.0 Platform

CSV information

Status active
Valid from 29.11.2022
Valid until 29.11.2027
Scheme 🇫🇷 FR
Manufacturer THALES DIS FRANCE SA
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL5+, AVA_VAN.5
Protection profiles

Heuristics summary

Certificate ID: ANSSI-CC-2022/53

Certificate

Extracted keywords

Security level
EAL5, EAL2
Certificates
ANSSI-CC-2022/53
Evaluation facilities
SERMA

File metadata

Title ANSSI-CC-2022/53
Keywords version 3.1, révision 5
Author DUCLOS Charlene
Creation date D:20221201134439+01'00'
Modification date D:20221201134439+01'00'
Pages 2
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Certification report

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC
Schemes
Key Agreement
Protocols
PACE
Randomness
RND, RNG

JavaCard versions
Java Card 3.1
Trusted Execution Environments
SE
Vendor
Infineon, Gemalto, Thales

Security level
EAL5+, EAL 5, EAL5, EAL 6+, EAL 5 augmented, EAL5 augmented
Claims
D.SCD, D.SVD, O.CIPHER, O.KEY-MNGT, O.REALLOCATION, O.GLOBAL_ARRA, O.ARRAY_VIEWS_, O.TRANSACTION, O.PIN-MNGT, O.OPERATE, O.DELETION, O.RESOURCES, O.ALARM, O.OBJ-DELETION, O.SCP, O.SID, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-OS-UPDATE, A.CGA, A.SCA, A.VERIFICATION, A.CAP_FILE, OE.HID_VAD, OE.VERIFICATION, OE.CAP_FILE, OE.CODE-EVIDENCE, OE.CODE-
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.3, FCS_COP, FCS_RNG.1, FCS_CMK.4, FCS_CKM.2, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_UIT, FDP_UIT.1, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_ITC, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_SMR, FMT_SMF, FPR_UNO.1, FPR_UNO, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_TDC.1, FPT_RCV, FPT_PHP, FPT_ITT, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0084, BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0059-2009-MA-01
Certificates
BSI-DSZ-CC-1107-2020, ANSSI-CC-2021/42, CC-1, CC-2, CC-3
Evaluation facilities
Serma Safety & Security

Side-channel analysis
Side channel, SPA, DPA, timing attacks, physical tampering, DFA, fault induction, fault injection

Standards
FIPS 186-4, FIPS 180-4, FIPS 202, NIST SP 800-56A, PKCS#1, AIS31, ISO/IEC 10116, SCP01, SCP02, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title BELPIC V1.8 applet on MultiApp V5.0 platform
Author THALES
Creation date D:20220620100119+02'00'
Modification date D:20220620100119+02'00'
Pages 75
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • ANSSI-CC-2021/42 - active - Plateforme Java Card MultiApp V5.0 version 5.0
  • BSI-DSZ-CC-1107-2020 - archived - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance

Security target

Extracted keywords

Symmetric Algorithms
AES
Asymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC
Schemes
Key Agreement
Protocols
PACE
Randomness
RND, RNG

JavaCard versions
Java Card 3.1
Trusted Execution Environments
SE
Vendor
Infineon, Gemalto, Thales

Security level
EAL5+, EAL 5, EAL5, EAL 6+, EAL 5 augmented, EAL5 augmented
Claims
D.SCD, D.SVD, O.CIPHER, O.KEY-MNGT, O.REALLOCATION, O.GLOBAL_ARRA, O.ARRAY_VIEWS_, O.TRANSACTION, O.PIN-MNGT, O.OPERATE, O.DELETION, O.RESOURCES, O.ALARM, O.OBJ-DELETION, O.SCP, O.SID, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.TOE_IDENTIFICATION, O.CONFID-OS-UPDATE, A.CGA, A.SCA, A.VERIFICATION, A.CAP_FILE, OE.HID_VAD, OE.VERIFICATION, OE.CAP_FILE, OE.CODE-EVIDENCE, OE.CODE-
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.5, ADV_TDS.4, ADV_IMP.1, ADV_TDS.3, ADV_INT.2, ADV_FSP.2, ADV_FSP.4, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC.4, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.4, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, ATE_DPT.3, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.3, FCS_COP, FCS_RNG.1, FCS_CMK.4, FCS_CKM.2, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_UIT, FDP_UIT.1, FDP_IFC, FDP_IFF, FDP_RIP, FDP_ROL, FDP_ITC, FDP_ITC.1, FDP_ITC.2, FDP_IFC.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD, FIA_UID, FIA_USB, FIA_UAU, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FMT_SMR, FMT_SMF, FPR_UNO.1, FPR_UNO, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_TDC.1, FPT_RCV, FPT_PHP, FPT_ITT, FTP_ITC, FTP_ITC.1, FTP_TRP.1
Protection profiles
BSI-PP-0084, BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0059-2009-MA-01
Certificates
BSI-DSZ-CC-1107-2020, ANSSI-CC-2021/42, CC-1, CC-2, CC-3
Evaluation facilities
Serma Safety & Security

Side-channel analysis
Side channel, SPA, DPA, timing attacks, physical tampering, DFA, fault induction, fault injection

Standards
FIPS 186-4, FIPS 180-4, FIPS 202, NIST SP 800-56A, PKCS#1, AIS31, ISO/IEC 10116, SCP01, SCP02, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title BELPIC V1.8 applet on MultiApp V5.0 platform
Author THALES
Creation date D:20220620100119+02'00'
Modification date D:20220620100119+02'00'
Pages 75
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

References

Outgoing
  • ANSSI-CC-2021/42 - active - Plateforme Java Card MultiApp V5.0 version 5.0
  • BSI-DSZ-CC-1107-2020 - archived - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2022/53

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, AVA_VAN.5

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_53.pdf",
  "dgst": "a9803e693eaf95e9",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2022/53",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.0",
        "1.8"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "d9553e7194783182",
        "d918b28fd7bb5d79"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2021/42",
          "BSI-DSZ-CC-1107-2020"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2021/42",
          "BSI-DSZ-CC-1107-2020"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2021/42",
          "BSI-DSZ-CC-1107-2020"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2021/42",
          "BSI-DSZ-CC-1107-2020"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "BelPIC V1.8 on MultiApp V5.0 Platform",
  "not_valid_after": "2027-11-29",
  "not_valid_before": "2022-11-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-anssi-cc-2022_53.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2022/53": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "DUCLOS Charlene",
      "/CreationDate": "D:20221201134439+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/Keywords": "version 3.1, r\u00e9vision 5",
      "/ModDate": "D:20221201134439+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Title": "ANSSI-CC-2022/53",
      "pdf_file_size_bytes": 311402,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cible-cc-2022_53en.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDH": {
            "ECDH": 7
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1107-2020": 1
        },
        "FR": {
          "ANSSI-CC-2021/42": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 2,
          "CC-3": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.CAP_FILE": 1,
          "A.CGA": 3,
          "A.SCA": 3,
          "A.VERIFICATION": 2
        },
        "D": {
          "D.SCD": 2,
          "D.SVD": 2
        },
        "O": {
          "O.ALARM": 1,
          "O.ARRAY_VIEWS_": 1,
          "O.CIPHER": 1,
          "O.CONFID-OS-UPDATE": 1,
          "O.DELETION": 1,
          "O.GLOBAL_ARRA": 2,
          "O.KEY-MNGT": 1,
          "O.OBJ-DELETION": 1,
          "O.OPERATE": 1,
          "O.PIN-MNGT": 1,
          "O.REALLOCATION": 1,
          "O.RESOURCES": 1,
          "O.SCP": 3,
          "O.SECURE_AC_ACTIVATION": 1,
          "O.SECURE_LOAD_ACODE": 1,
          "O.SID": 1,
          "O.TOE_IDENTIFICATION": 1,
          "O.TRANSACTION": 1
        },
        "OE": {
          "OE.CAP_FILE": 2,
          "OE.CODE-": 1,
          "OE.CODE-EVIDENCE": 1,
          "OE.HID_VAD": 11,
          "OE.VERIFICATION": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0099-V2-2020": 1,
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 7,
          "ADV_FSP.1": 4,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 9,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 6,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 10,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 10
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 6+": 1,
          "EAL5": 9,
          "EAL5 augmented": 3,
          "EAL5+": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 36,
          "FCS_CKM.1": 4,
          "FCS_CKM.2": 2,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 14,
          "FCS_CKM.4.1": 1,
          "FCS_CMK.4": 1,
          "FCS_COP": 24,
          "FCS_COP.1": 12,
          "FCS_COP.1.1": 1,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 34,
          "FDP_ACC.1": 11,
          "FDP_ACF": 27,
          "FDP_ACF.1": 15,
          "FDP_IFC": 2,
          "FDP_IFC.1": 5,
          "FDP_IFF": 2,
          "FDP_ITC": 1,
          "FDP_ITC.1": 2,
          "FDP_ITC.2": 2,
          "FDP_RIP": 15,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 1,
          "FDP_SDI": 17,
          "FDP_SDI.2": 6,
          "FDP_UIT": 6,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 12,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 28,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 7,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 14,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 9,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 16,
          "FMT_MTD.1": 2,
          "FMT_SMF": 3,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_EMS": 4,
          "FPT_EMS.1": 8,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 8,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 1,
          "FPT_PHP": 2,
          "FPT_PHP.1": 7,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 2,
          "FPT_RCV": 2,
          "FPT_TDC.1": 1,
          "FPT_TST": 3,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 15,
          "FTP_ITC.1": 7,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 4
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.1": 7
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "fault induction": 1,
          "fault injection": 1,
          "physical tampering": 9
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "Side channel": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 186-4": 3,
          "FIPS 202": 1
        },
        "ISO": {
          "ISO/IEC 10116": 4
        },
        "NIST": {
          "NIST SP 800-56A": 1
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "SCP": {
          "SCP01": 1,
          "SCP02": 1,
          "SCP03": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 1
        },
        "Infineon": {
          "Infineon": 11
        },
        "Thales": {
          "Thales": 95
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "THALES",
      "/CreationDate": "D:20220620100119+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20220620100119+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "BELPIC V1.8 applet on MultiApp V5.0 platform",
      "pdf_file_size_bytes": 2637994,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 75
    },
    "st_filename": "anssi-cible-cc-2022_53en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDH": {
            "ECDH": 7
          },
          "ECDSA": {
            "ECDSA": 6
          }
        },
        "RSA": {
          "RSA 2048": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1107-2020": 1
        },
        "FR": {
          "ANSSI-CC-2021/42": 1
        },
        "NL": {
          "CC-1": 2,
          "CC-2": 2,
          "CC-3": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.CAP_FILE": 1,
          "A.CGA": 3,
          "A.SCA": 3,
          "A.VERIFICATION": 2
        },
        "D": {
          "D.SCD": 2,
          "D.SVD": 2
        },
        "O": {
          "O.ALARM": 1,
          "O.ARRAY_VIEWS_": 1,
          "O.CIPHER": 1,
          "O.CONFID-OS-UPDATE": 1,
          "O.DELETION": 1,
          "O.GLOBAL_ARRA": 2,
          "O.KEY-MNGT": 1,
          "O.OBJ-DELETION": 1,
          "O.OPERATE": 1,
          "O.PIN-MNGT": 1,
          "O.REALLOCATION": 1,
          "O.RESOURCES": 1,
          "O.SCP": 3,
          "O.SECURE_AC_ACTIVATION": 1,
          "O.SECURE_LOAD_ACODE": 1,
          "O.SID": 1,
          "O.TOE_IDENTIFICATION": 1,
          "O.TRANSACTION": 1
        },
        "OE": {
          "OE.CAP_FILE": 2,
          "OE.CODE-": 1,
          "OE.CODE-EVIDENCE": 1,
          "OE.HID_VAD": 11,
          "OE.VERIFICATION": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-01": 1,
          "BSI-CC-PP-0099-V2-2020": 1,
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 7,
          "ADV_FSP.1": 4,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 8,
          "ADV_IMP.1": 9,
          "ADV_INT.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 4,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 6,
          "AGD_PRE.1": 6
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_DVS.2": 10,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 2,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 5,
          "ASE_OBJ.2": 3,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 2,
          "ASE_SPD.1": 2,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 6
        },
        "AVA": {
          "AVA_VAN.5": 10
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL 6+": 1,
          "EAL5": 9,
          "EAL5 augmented": 3,
          "EAL5+": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 36,
          "FCS_CKM.1": 4,
          "FCS_CKM.2": 2,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 14,
          "FCS_CKM.4.1": 1,
          "FCS_CMK.4": 1,
          "FCS_COP": 24,
          "FCS_COP.1": 12,
          "FCS_COP.1.1": 1,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 34,
          "FDP_ACC.1": 11,
          "FDP_ACF": 27,
          "FDP_ACF.1": 15,
          "FDP_IFC": 2,
          "FDP_IFC.1": 5,
          "FDP_IFF": 2,
          "FDP_ITC": 1,
          "FDP_ITC.1": 2,
          "FDP_ITC.2": 2,
          "FDP_RIP": 15,
          "FDP_RIP.1": 9,
          "FDP_RIP.1.1": 1,
          "FDP_ROL": 1,
          "FDP_SDI": 17,
          "FDP_SDI.2": 6,
          "FDP_UIT": 6,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 5,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 10,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 12,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 28,
          "FMT_MSA.1": 4,
          "FMT_MSA.2": 7,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 14,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MSA.4": 9,
          "FMT_MSA.4.1": 1,
          "FMT_MTD": 16,
          "FMT_MTD.1": 2,
          "FMT_SMF": 3,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 4,
          "FMT_SMR.1": 21,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_EMS": 4,
          "FPT_EMS.1": 8,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 8,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_ITT": 1,
          "FPT_PHP": 2,
          "FPT_PHP.1": 7,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 2,
          "FPT_RCV": 2,
          "FPT_TDC.1": 1,
          "FPT_TST": 3,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC": 15,
          "FTP_ITC.1": 7,
          "FTP_TRP.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 4
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "Serma Safety \u0026 Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.1": 7
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 2,
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "fault induction": 1,
          "fault injection": 1,
          "physical tampering": 9
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "Side channel": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 186-4": 3,
          "FIPS 202": 1
        },
        "ISO": {
          "ISO/IEC 10116": 4
        },
        "NIST": {
          "NIST SP 800-56A": 1
        },
        "PKCS": {
          "PKCS#1": 1
        },
        "SCP": {
          "SCP01": 1,
          "SCP02": 1,
          "SCP03": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 1
        },
        "Infineon": {
          "Infineon": 11
        },
        "Thales": {
          "Thales": 95
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "THALES",
      "/CreationDate": "D:20220620100119+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20220620100119+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "BELPIC V1.8 applet on MultiApp V5.0 platform",
      "pdf_file_size_bytes": 2637994,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 75
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_53en.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "EAL5+",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_53en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c0362ddf2f1a3d0c41c7a0a2d8f81cf00090a15c80518329309f3613b14603ce",
      "txt_hash": "32dc2ddf26f94db898269dae471caa5514495cea89549c141e52df476ba67bb7"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "68e6188ca228f64b35a1be4546a2fc5931b3793056f9e3bad8cb7c17cdbbdd50",
      "txt_hash": "a4cdb81b9630dba243eb10bde9dbb88d25a8b23073a23190d1390e19a0e176e9"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "68e6188ca228f64b35a1be4546a2fc5931b3793056f9e3bad8cb7c17cdbbdd50",
      "txt_hash": "a4cdb81b9630dba243eb10bde9dbb88d25a8b23073a23190d1390e19a0e176e9"
    }
  },
  "status": "active"
}