ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC with PACE configuration (Version 4.0.1.52)

CSV information

Status active
Valid from 01.03.2023
Valid until 01.03.2028
Scheme 🇫🇷 FR
Manufacturer NXP Semiconductors
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, EAL5+, AVA_VAN.5
Protection profiles

Heuristics summary

Certificate ID: ANSSI-CC-2023/11

Certificate

certificate file processing did not finish successfully.
Download pdf: OK
Convert pdf to text: OK
Extract keywords: ERROR

Extracted keywords

Protocols
PACE

Operating System name
JCOP 4
Vendor
NXP

Security level
EAL5, EAL2
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01
Certificates
ANSSI-CC-2023/11
Evaluation facilities
THALES/CNES

Standards
ICAO

Certification report

certification report file processing did not finish successfully.
Download pdf: OK
Convert pdf to text: OK
Extract keywords: ERROR

Extracted keywords

Symmetric Algorithms
DES
Protocols
PACE

Operating System name
JCOP 4
IC data groups
EF.CardAccess
Vendor
NXP, NXP Semiconductors

Security level
EAL5, EAL2, EAL7, ITSEC E6 Elevé
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR, AVA_VAN.5, AVA_VAN
Protection profiles
BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-V2-2011-MA-01, BSI-CC-PP-0056-V2-2012-MA02
Certificates
BSI-DSZ-CC-1149-2022, ANSSI-CC-2023/11, NSCIB-CC-0313985-CR, NSCIB-CC-0313985-MA
Evaluation facilities
THALES/CNES, CESTI

Standards
ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

References

Outgoing

Security target

security target file processing did not finish successfully.
Download pdf: OK
Convert pdf to text: OK
Extract keywords: ERROR

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, KMAC, CMAC
Asymmetric Algorithms
RSA 1024, RSA-PSS, ECDH, ECDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Protocols
PACE
Randomness
RNG
Block cipher modes
CBC

Operating System name
JCOP 4
IC data groups
EF.DG14, EF.DG1, EF.DG2, EF.DG3, EF.DG4, EF.DG16, EF.DG15, EF.DG5, EF.COM, EF.CardAccess, EF.SOD, EF.ChipSecurity
Vendor
NXP Semiconductors, NXP

Security level
EAL5, EAL5 augmented
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.2, ALC_DVS.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.5, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_SAS.1.1, FCS_RND, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_COP, FCS_COP.1, FCS_RND.1, FCS_RND.1.1, FDP_SDC, FDP_SDC.1, FDP_SDI, FDP_SDC.1.1, FDP_RIP, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_UCT, FDP_UCT.1, FDP_UIT, FDP_UIT.1, FDP_RIP.1, FIA_API, FIA_UAU.4, FIA_UAU, FIA_AFL, FIA_AFL.1, FIA_API.1, FIA_UID, FIA_UID.1, FIA_UAU.1, FIA_UAU.5, FIA_UAU.6, FMT_LIM, FMT_MTD, FMT_MOF, FMT_MOF.1, FMT_MTD.1, FMT_MTD.3, FMT_MTD.3.1, FMT_LIM.1, FMT_LIM.1.1, FMT_LIM.2, FMT_LIM.2.1, FMT_SMF, FMT_SMF.1, FMT_SMR, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1, FPT_EMS, FPT_EMS.1, FPT_FLS, FPT_FLS.1, FPT_TST, FPT_PHP, FPT_PHP.3, FPT_TST.1, FTP_ITC, FTP_ITC.1
Protection profiles
BSI-CC-PP-0056-V2-2012-MA-02, BSI-CC-PP-0068-, BSI-CC-PP-0086, BSI-CC-PP-0055, BSI-CC-PP-0087-V2-MA-01
Certificates
BSI-DSZ-CC-1149-2022, CC-22-0313985

Side-channel analysis
physical probing, physical tampering, Physical Tampering, malfunction, Malfunction

Standards
FIPS180-4, FIPS 180-4, FIPS 46-3, FIPS 197, FIPS PUB 46-3, PKCS#3, PKCS#1, AIS31, ISO/IEC 9796-2, ICAO, ICAO-SAC, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-03110

References

Outgoing
  • BSI-DSZ-CC-1149-2022 - active - NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1)

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2023/11

Extracted SARs

ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5

Similar certificates

Name Certificate ID
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration Version 4.1.1.52 ( ANSSI-CC-2023/68) ANSSI-CC-2023/68 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration(Version 4.0.1.52) ANSSI-CC-2023/10 Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO BAC configuration (Version 4.0.1.52) ( ANSSI-CC-2023/10-R01 ) ANSSI-CC-2023/10-R01 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in ICAO BAC configuration Version 4.1.1.52 ( ANSSI-CC-2023/67) ANSSI-CC-2023/67 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC (1&2) with PACE configuration, Version 3.1.6.52 ANSSI-CC-2021/19 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.2.0.52) (ANSSI-CC-2025/02) ANSSI-CC-2025/02 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration(Version 4.0.1.52) ANSSI-CC-2023/12 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.1.6.52) (ANSSI-CC-2021/19-R01) ANSSI-CC-2021/19-R01 Compare
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) ANSSI-CC-2023/12-R01 Compare
ChipDoc v3 on JCOP 4 P71 in ICAO EAC with PACE configuration (Version 3.0.0.52) (ANSSI-CC-2020/72-R01) ANSSI-CC-2020/72-R01 Compare
ChipDoc v4.1 on JCOP 4.5 P71 in SSCD configuration Version 4.1.1.52 (ANSSI-CC-2023/69) ANSSI-CC-2023/69 Compare
ChipDoc v3 on JCOP 4 P71in ICAO EAC with PACE configuration (Version 3.0.0.52) ANSSI-CC-2020/09 Compare
ChipDoc v3 on JCOP 4 P71 in ICAO BAC configuration (Version 3.0.0.52) ANSSI-CC-2020/10 Compare
ChipDoc v3 on JCOP 4 P71 in ICAO BAC configuration(Version 3.0.0.52) ANSSI-CC-2020/10-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC (1&2) with PACE configuration (v2) ANSSI-CC-2021/19v2 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (Version 3.1.6.52) ANSSI-CC-2021/18 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (Version 3.1.6.52) (ANSSI-CC-2021/18-R01) ANSSI-CC-2021/18-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC with PACE configuration ANSSI-CC-2020/75 Compare
ChipDoc v3.2 on JCOP 4 P71 in ICAO BAC configuration (Version 3.2.0.52)(ANSSI-CC-2025/01) ANSSI-CC-2025/01 Compare
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration Version 3.1.6.52 ANSSI-CC-2021/20 Compare
ChipDoc v3 on JCOP 4 P71 in SSCD configuration (Version 3.0.0.52) (ANSSI-CC-2020/73-R01) ANSSI-CC-2020/73-R01 Compare
ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (Version 3.1.6.52) (ANSSI-CC-2021/20-R01) ANSSI-CC-2021/20-R01 Compare
ChipDoc v3 on JCOP 4 P71 in ICAO EAC with PACE configuration ANSSI-CC-2020/72 Compare
NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE0... NSCIB-CC-2300172-01-CR Compare
ChipDoc v3.2 on JCOP 4 P71 in SSCD configuration (Version 3.2.0.52) (ANSSI-CC-2025/03) ANSSI-CC-2025/03 Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.4.0.0) ANSSI-CC-2021/52 Compare
secunet konnektor 2.0.0 und 2.1.0, Version 5.70.4:2.0.0 und 5.70.4:2.1.0 BSI-DSZ-CC-1044-V8-2025 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 - PACE, EAC(version 1.0) ANSSI-CC-2020/49-R01 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 – PACE, EAC (version 1.0) ANSSI-CC-2020/49 Compare
Digital Identity on MultiApp v4.0.1 platform with Filter Set 1.0 - PACE, EAC(version 1.0) (ANSSI-CC-2020/49-R01) ANSSI-CC-2020/49-R01 Compare
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC112... None Compare
NXP JCOP6.x on SN200.C04 Secure Element, versions JCOP6.0 R1.13.0 "SN200", JCOP6.1 R1.04.0 "SN200", JCOP6.1 R1.04.0 "... NSCIB-CC-2300044-01-CR Compare
Showing 5 out of 33.

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2023_11cdv4eacpace.pdf",
  "dgst": "ada28370064d4e9b",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2023/11",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.0.1.52",
        "4.5"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "b380aabf93b29692",
        "a33327d40f253f46"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-2022",
          "NSCIB-CC-0313985-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-2022",
          "NSCIB-CC-0313985-CR"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-2022"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1149-2022"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors",
  "manufacturer_web": "https://www.nxp.com/",
  "name": "ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC with PACE configuration (Version 4.0.1.52)",
  "not_valid_after": "2028-03-01",
  "not_valid_before": "2023-03-01",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-2023_11cdv4eacpace.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2023/11": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012-MA-02": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 3
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Thales": {
          "THALES/CNES": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 1
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ICAO": {
          "ICAO": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 2
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": null,
    "report_filename": "anssi-cc-2023_11_eac_pace.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1149-2022": 1
        },
        "FR": {
          "ANSSI-CC-2023/11": 2
        },
        "NL": {
          "NSCIB-CC-0313985-CR": 1,
          "NSCIB-CC-0313985-MA": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0056-V2-2012-MA-02": 1,
          "BSI-CC-PP-0056-V2-2012-MA02": 1,
          "BSI-CC-PP-0068-V2-2011-MA-01": 2
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 2,
          "EAL5": 1,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 15
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CESTI": {
          "CESTI": 1
        },
        "Thales": {
          "THALES/CNES": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {
        "EF": {
          "EF.CardAccess": 1
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 7
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "ICAO": {
          "ICAO": 8
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 8,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": null,
    "st_filename": "anssi-cible-cc-2023_11en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 3
          },
          "ECDSA": {
            "ECDSA": 2
          }
        },
        "FF": {
          "DH": {
            "DH": 7,
            "Diffie-Hellman": 3
          }
        },
        "RSA": {
          "RSA 1024": 1,
          "RSA-PSS": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1149-2022": 3
        },
        "NL": {
          "CC-22-0313985": 2
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0056-V2-2012-MA-02": 2,
          "BSI-CC-PP-0068-": 2,
          "BSI-CC-PP-0086": 1,
          "BSI-CC-PP-0087-V2-MA-01": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 5,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 6,
          "ADV_IMP.1": 5,
          "ADV_INT.2": 2,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 8
        },
        "AGD": {
          "AGD_OPE.1": 4,
          "AGD_PRE.1": 5
        },
        "ALC": {
          "ALC_CMC.4": 2,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 6,
          "ALC_LCD.1": 3,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 3
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 2,
          "ASE_INT.1": 4,
          "ASE_OBJ.2": 3,
          "ASE_REQ.2": 4,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 2
        },
        "ATE": {
          "ATE_COV.2": 4,
          "ATE_DPT.1": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.1": 3,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL5": 7,
          "EAL5 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS": 1,
          "FAU_SAS.1": 8,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM": 50,
          "FCS_CKM.1": 1,
          "FCS_CKM.4": 1,
          "FCS_COP": 58,
          "FCS_COP.1": 1,
          "FCS_RND": 1,
          "FCS_RND.1": 14,
          "FCS_RND.1.1": 1
        },
        "FDP": {
          "FDP_ACC": 13,
          "FDP_ACC.1": 1,
          "FDP_ACF": 19,
          "FDP_ACF.1": 16,
          "FDP_RIP": 27,
          "FDP_RIP.1": 3,
          "FDP_SDC": 10,
          "FDP_SDC.1": 6,
          "FDP_SDC.1.1": 1,
          "FDP_SDI": 1,
          "FDP_UCT": 8,
          "FDP_UCT.1": 1,
          "FDP_UIT": 7,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 32,
          "FIA_AFL.1": 3,
          "FIA_API": 26,
          "FIA_API.1": 3,
          "FIA_UAU": 85,
          "FIA_UAU.1": 4,
          "FIA_UAU.4": 2,
          "FIA_UAU.5": 2,
          "FIA_UAU.6": 1,
          "FIA_UID": 35,
          "FIA_UID.1": 4
        },
        "FMT": {
          "FMT_LIM": 1,
          "FMT_LIM.1": 7,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 7,
          "FMT_LIM.2.1": 1,
          "FMT_MOF": 5,
          "FMT_MOF.1": 2,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 3,
          "FMT_MTD": 96,
          "FMT_MTD.1": 4,
          "FMT_MTD.3": 9,
          "FMT_MTD.3.1": 1,
          "FMT_SMF": 21,
          "FMT_SMF.1": 2,
          "FMT_SMR": 18,
          "FMT_SMR.1": 2
        },
        "FPT": {
          "FPT_EMS": 7,
          "FPT_EMS.1": 3,
          "FPT_FLS": 11,
          "FPT_FLS.1": 2,
          "FPT_PHP": 7,
          "FPT_PHP.3": 1,
          "FPT_TST": 7,
          "FPT_TST.1": 3
        },
        "FTP": {
          "FTP_ITC": 22,
          "FTP_ITC.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 316
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 5
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 3,
            "SHA-384": 2,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {
        "EF": {
          "EF.COM": 1,
          "EF.CardAccess": 1,
          "EF.ChipSecurity": 1,
          "EF.DG1": 5,
          "EF.DG14": 5,
          "EF.DG15": 2,
          "EF.DG16": 4,
          "EF.DG2": 2,
          "EF.DG3": 8,
          "EF.DG4": 8,
          "EF.DG5": 1,
          "EF.SOD": 2
        }
      },
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 102
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 4,
          "Physical Tampering": 3,
          "malfunction": 8,
          "physical tampering": 2
        },
        "SCA": {
          "physical probing": 3
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 197": 4,
          "FIPS 46-3": 3,
          "FIPS PUB 46-3": 1,
          "FIPS180-4": 1
        },
        "ICAO": {
          "ICAO": 149,
          "ICAO-SAC": 1
        },
        "ISO": {
          "ISO/IEC 9796-2": 1
        },
        "PKCS": {
          "PKCS#1": 2,
          "PKCS#3": 1
        },
        "SCP": {
          "SCP03": 10
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 22
          }
        },
        "DES": {
          "3DES": {
            "TDES": 6
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CMAC": 6,
            "KMAC": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03110": 2
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 105,
          "NXP Semiconductors": 38
        }
      },
      "vulnerability": {}
    },
    "st_metadata": null
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2023_11_eac_pace.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "EAL5+",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2023_11en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "pdf_hash": "28df60d8da38152c4472fe94a583f3dfb1e2c23786605feb7a3902944ca628df",
      "txt_hash": "45424dc5728702c40e8069c1de2c9b772855b4e1eb0fa0c330138a1e00b67a79"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "pdf_hash": "1239d8049f1b2a6372adeb3c3c0476f7d668f03e88b875c54cfa8634609118b6",
      "txt_hash": "17d86fdc6e3701e728bdcc017b54525cdcac1129f47444617325b5f753bb2d9c"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "pdf_hash": "8046aa077ec3cfa467cb59099cfe23262b1164265d515dcb8f7da6d9bf1383bc",
      "txt_hash": "ad1944c2cabf659d4701fbcffd82f408f04616e3bf3a4910af9ed5942bc6e7e7"
    }
  },
  "status": "active"
}