Logiciel Mistral IPversion 2.0.84

CSV information ?

Status archived
Valid from 22.12.2014
Valid until 22.12.2019
Scheme 🇫🇷 FR
Manufacturer Thales Communications & Security
Category Boundary Protection Devices and Systems
Security level ALC_FLR.3, AVA_VAN.3, EAL3+
Maintenance updates ANSSI-CC-2014/91-M01 (10.06.2015) Certification report

Heuristics summary ?

Certificate ID: ANSSI-CC-2014/91

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES
Schemes
MAC
Protocols
VPN
Libraries
OpenSSL

Trusted Execution Environments
SE
Vendor
Thales

Security level
EAL 3, EAL4, EAL 1, EAL 5, EAL 7, ITSEC E3 Elémentaire
Security Assurance Requirements (SAR)
ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE, AGD_PRE, ALC_FLR.3, ALC_FLR, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.3, AVA_VAN, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Certificates
ANSSI-CC-2014/91

Standards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title ANSSI-CC-2014_91
Pages 16
Creator PDFCreator Version 1.2.1
Producer GPL Ghostscript 9.02

Security target ?

Extracted keywords

Symmetric Algorithms
AES, HMAC, HMAC-SHA-256, HMAC-SHA-384, HMAC-SHA-512
Asymmetric Algorithms
ECDH, ECDSA, ECC, DH, Diffie-Hellman, DSA
Hash functions
SHA512, SHA-256, SHA-384
Schemes
MAC, Key Exchange, Key exchange
Protocols
SSH, TLS, IKEv2, IKE, IKEv1, IPsec, VPN
Randomness
PRNG, RBG
Block cipher modes
CBC, GCM

Trusted Execution Environments
SE
Vendor
Thales

Security level
EAL3, EAL3 augmented
Claims
D.APPLICATIVE_DATA, D.TOPOLOGIC_INFO, D.SECURITY_POLICIES, D.CONFIG_PARAM, D.SUPERVISION_DATA, D.CRYPTO_KEYS, D.CRYPTO_KEYS_PROTECTION_PWD, D.AUDIT, D.AUTHENTICATION_DATA, D.SOFTWARE, D.SWUPDATE_PUBLICKEYS, D.TIME_BASE, D.SOFTWARES, D.CRYPTO_KEY, O.PROTECTED_COMMUNICATIONS, O.POL_ENFORCEMENT, O.FLOW_PARTITIONING, O.AUDIT, O.TIME_BASE, O.AUDIT_PROTECTION, O.SUPERVISION, O.SUPERVISION_IMPACT, O.VISUAL_ALARMS, O.ROLES, O.AUTHENTICATION_FAILURE, O.DISPLAY_BANNER, O.SESSION_LOCK, O.MANAGEMENT, O.VIEW, O.POL_VIEW, O.RESIDUAL_INFORMATION_CLEAR, O.DATA_ERASURE, O.LOCAL_DATA_PROTECTION, O.SOFTWARE_UPDATES, O.KEYS_INJECTION, O.CRYPTOPERIOD, O.CRYPTO_REGULATION, O.SELF_TEST, O.LED, O.VISUAL, T.ADMIN_ERROR, T.TSF_FAILURE, T.UNDETECTED_ACTIONS, T.UNAUTHORISED_ACCESS, T.UNAUTHORISED_UPDATE, T.USER_DATA_REUSE, T.TIME_BASE, T.RESIDUAL_DATA, A.NO_GENERAL_PURPOSE, A.PHYSICAL_ENVIRONMENT_TOE, A.SW_PROTECTION, A.TRUSTED_ADMIN, A.CONFIGURATION_CONTROL, A.ALARM, A.POLICIES_CONTINUITY, A.TRUSTED_NETWORKS, A.SECURED_MANAGEMENT_DEVICES, A.ACCESS_CONTROL_MANAGEMENT_DEVICES, A.PHYSICAL_ENVIRONMENT_MANAGEMENT_DEVICES, A.AUDIT, A.SGC_TO_FRONT-END, A.STAND_ALONE_CEC, A.KEY_TRANSPORTATION, A.CEC_CRYPTO_REGULATION, A.TRUSTED_NETWORK, R.ADMINISTRATOR, R.SGC, R.OPERATOR, R.SGL, OE.TRUSTED_ADMIN, OE.ALARM, OE.POLICIES_CONTINUITY, OE.TRUSTED_NETWORKS, OE.AUDIT_ANALYSIS, OE.AUDIT_MNGT, OE.PHYSICAL_ENVIRONMENT_TOE, OE.LINUX_GUIDANCE, OE.TOE_INTEGRITY, OE.TOE_TRANSPORTATION, OE.SECURED_SGC, OE.ACCESS_CONTROL_SGC, OE.SECURED_NTP_SERVER, OE.ACCESS_CONTROL_NTP_SERVER, OE.NTP_SERVER_LOCATION, OE.ACCESS_CONTROL_SF, OE.PHYSICAL_ENVIRONMENT_SGC, OE.PHYSICAL_ENVIRONMENT_SF, OE.PHYSICAL_ENVIRONMENT_NTP_SERVER, OE.SGC_TO_FRONT-END, OE.AUDIT_RECORD_SGC, OE.DISPLAY_BANNER_SGC, OE.SECURED_SGL, OE.ACCESS_CONTROL_SGL, OE.SGL_CONNECTION, OE.PHYSICAL_ENVIRONMENT_SGL, OE.SECURED_CEC, OE.STAND_ALONE_CEC, OE.ACCESS_CONTROL_CEC, OE.PHYSICAL_ENVIRONMENT_CEC, OE.KEY_TRANSPORTATION, OE.CEC_CRYPTO_REGULATION, OE.SW_PROTECTION, OE.SW_UPDATE_KEY, OE.TRUSTED_NETWORK, OE.KEYS_TRANSPORTATION
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_TDS.1, ADV_FSP.3, ADV_TDS.2, ADV_FSP.2, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.3, ALC_CMC.3, ALC_CMS.1, ALC_DVS.1, ALC_LCD.1, ALC_CMS.3, ALC_DEL.1, ATE_COV.2, ATE_FUN.1, ATE_COV.1, ATE_DPT.1, AVA_VAN.3, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.1, ASE_REQ.2, ASE_OBJ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN_EXT.3, FAU_STG_EXT.1, FAU_STG_EXT.3, FAU_GEN.1, FAU_GEN, FAU_GEN_EXT.3.1, FAU_STG.1, FAU_STG_EXT.1.1, FAU_STG.3, FAU_STG_EXT.3.1, FAU_SEG.1, FAU_GEN.1.1, FAU_GEN.2, FAU_GEN.1.2, FAU_GEN.2.1, FCS_RBG_EXT, FCS_IPS_EXT, FCS_CKM_EXT.4, FCS_CKM_EXT.5, FCS_COP, FCS_RBG_EXT.1, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_IPS_EXT.1, FCS_COP.1, FCS_IPS_EXT.1.1, FCS_IPS_EXT.1.2, FCS_IPS_EXT.1.3, FCS_IPS_EXT.1.4, FCS_IPS_EXT.1.5, FCS_IPS_EXT.1.6, FCS_IPS_EXT.1.7, FCS_IPS_EXT.1.8, FCS_CKM, FCS_CKM.1, FCS_CKM_EXT.4.1, FCS_CKM.4, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.5.3, FCS_CKM_EXT, FCS_CKM.3, FDP_ITC.1, FDP_ITC.2, FDP_UCT, FDP_IFF, FDP_UIT, FDP_ITC, FDP_ETC, FDP_IFC, FDP_RIP.2, FDP_UCT.1, FDP_UIT.1, FDP_ETC.2, FDP_IFC.1, FDP_IFF.1, FDP_RIP.2.1, FDP_ACC.1, FIA_UIA_EXT, FIA_PMG_EXT, FIA_UAU_EXT.2, FIA_UIA_EXT.1, FIA_UIA_EXT.1.1, FIA_UIA_EXT.1.2, FIA_PMG_EXT.1, FIA_PMG_EXT.1.1, FIA_UAU, FIA_UAU_EXT.2.1, FIA_UID, FIA_UAU_EXT, FIA_AFL, FIA_UID.2, FIA_UAU.6, FIA_UAU.7, FIA_AFL.1, FIA_AFL.1.1, FIA_UIA, FIA_UID.1, FIA_UAU.1, FMT_MSA.3, FMT_MTD, FMT_SMR, FMT_SMF.1, FMT_MOF, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MTD.1, FMT_MDT, FMT_SKP_EXT.1, FMT_MSA.1, FPT_SIE_EXT, FPT_SKP_EXT, FPT_APW_EXT, FPT_TUD_EXT, FPT_SDP_EXT, FPT_SIE_EXT.1, FPT_SIE_EXT.2, FPT_SIE_EXT.1.1, FPT_SIE_EXT.2.1, FPT_SKP_EXT.1, FPT_SKP_EXT.1.1, FPT_APW_EXT.1, FPT_APW_EXT.1.1, FPT_APW_EXT.1.2, FPT_TUD_EXT.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_SDP_EXT.1, FPT_SDP_EXT.2, FPT_SDP_EXT.1.1, FPT_SDP_EXT.2.1, FPT_SDP_EXT.2.2, FPT_STM.1, FPT_TDC, FPT_FLS.1, FPT_TST.1, FPT_STM.1.1, FPT_TDC.1, FPT_FLS.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL_EXT.1, FTA_TAB.1, FTA_SSL.1, FTA_SSL_EXT.1.1, FTA_SSL_EXT, FTA_SSL, FTA_TAB, FTA_SSL.4, FTP_ITC.1, FTP_ITC, FTP_TRP.1

Certification process
out of scope, Mistral IP system are considered as part of the operational environment. Thus, those equipments are out of scope of the Target of Evaluation described in this Security Target. In particular, the Mistral

Standards
FIPS PUB 197, FIPS 197, FIPS 186-4, FIPS 180-3, FIPS 198-1, NIST SP 800-38A, NIST SP 800-38D, SP 800-107, RFC 1042, RFC 1213, RFC 2408, RFC 2409, RFC 3566, RFC 3602, RFC 894, RFC 5996, RFC 4303, RFC 4106, RFC 4109, RFC 4868, RFC 5639, RFC 5903

File metadata

Title SECURITY TARGET OF MISTRAL IP ENCRYPTION DEVICE
Author T0065286
Creation date D:20150320191108+01'00'
Modification date D:20150320191108+01'00'
Pages 115
Creator Microsoft® Word 2010
Producer Microsoft® Word 2010

Heuristics ?

Certificate ID: ANSSI-CC-2014/91

Extracted SARs

ASE_ECD.1, ASE_REQ.2, ALC_LCD.1, ALC_CMS.3, ALC_CMC.3, AGD_OPE.1, AVA_VAN.3, ASE_CCL.1, AGD_PRE.1, ALC_FLR.3, ASE_OBJ.2, ATE_COV.2, ADV_TDS.3, ASE_INT.1, ASE_TSS.1, ADV_ARC.1, ALC_DEL.1, ATE_DPT.1, ADV_IMP.1, ADV_FSP.4, ATE_FUN.1, ALC_DVS.1, ASE_SPD.1

Scheme data ?

Product Logiciel Mistral IP version 2.0.84
Url https://cyber.gouv.fr/produits-certifies/logiciel-mistral-ip-version-2084
Description Le produit certifiéest le logiciel du chiffreur IP, version 2.0.84, embarqué sur le boitier matériel Mistral, version 1.2.00, développé par Thales Communications. Le produit, est un équipement de chiffrement de niveau réseau (couche 3 du modèle OSI) assurant la protection des paquets IP. Il offre des services de protection de données échangées sur des liens d’interconnexions de réseaux locaux
Sponsor Thales Communications
Developer Thales Communications
Cert Id ANSSI-CC-2014/91
Level EAL3+
Enhanced
Cert Id ANSSI-CC-2014/91
Certification Date 22.12.2014
Category Produits réseau
Cc Version
Developer Thales Communications
Sponsor Thales Communications
Evaluation Facility Amossys
Level EAL3+
Protection Profile -
Mutual Recognition
Augmented ALC_FLR.3, AVA_VAN.3
Target Link https://cyber.gouv.fr/sites/default/files/2015/03/CC-2014-91_Cible-Lite.pdf
Report Link https://cyber.gouv.fr/sites/default/files/2015/03/ANSSI-CC-2014_91.pdf

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'description': 'Le produit certifiĂ©est le logiciel du chiffreur IP, version 2.0.84, embarquĂ© sur le boitier matĂ©riel Mistral, version 1.2.00, dĂ©veloppĂ© par Thales Communications. Le produit, est un Ă©quipement de chiffrement de niveau rĂ©seau (couche 3 du modèle OSI) assurant la protection des paquets IP. Il offre des services de protection de donnĂ©es Ă©changĂ©es sur des liens d’interconnexions de rĂ©seaux locaux', 'cert_id': 'ANSSI-CC-2014/91', 'enhanced': {'__update__': {'cert_id': 'ANSSI-CC-2014/91', 'certification_date': '2014-12-22'}}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'Logiciel Mistral IP version 2.0.84', 'url': 'https://cyber.gouv.fr/produits-certifies/logiciel-mistral-ip-version-2084', 'description': 'Le produit certifiĂ©est le logiciel du chiffreur IP, version 2.0.84, embarquĂ© sur le boitier matĂ©riel Mistral, version 1.2.00, dĂ©veloppĂ© par Thales Communications.\n\nLe produit, est un Ă©quipement de chiffrement de niveau rĂ©seau (couche 3 du modèle OSI) assurant la protection des paquets IP. Il offre des services de protection de donnĂ©es Ă©changĂ©es sur des liens d’interconnexions de rĂ©seaux locaux', 'sponsor': 'Thales Communications', 'developer': 'Thales Communications', 'cert_id': '2014/91', 'level': 'EAL3+', 'enhanced': {'cert_id': '2014/91', 'certification_date': '22/12/2014', 'category': 'Produits rĂ©seau', 'cc_version': '', 'developer': 'Thales Communications', 'sponsor': 'Thales Communications', 'evaluation_facility': 'Amossys', 'level': 'EAL3+', 'protection_profile': '-', 'mutual_recognition': '', 'augmented': 'ALC_FLR.3, AVA_VAN.3', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2015/03/CC-2014-91_Cible-Lite.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2015/03/ANSSI-CC-2014_91.pdf'}}.
  • 02.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '81e5c14576ae940c8e90a725a859542c026d9f5b4e1bff697b4a9431219f62c5', 'txt_hash': '5a675cc86b7667e93a579a1019b5e811c879abe0101c800997bd905b6870eb9c'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '32152dae4edacf5960e1f9332142b5696abf6f7d312f96dfdd58e44d9d2a64b9', 'txt_hash': 'e1b4dc8f1d687e37e1ae71776f01f307372983276405424a60a1444b4b10164d'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 790624, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/Producer': 'GPL Ghostscript 9.02', '/CreationDate': '', '/ModDate': '', '/Title': 'ANSSI-CC-2014_91', '/Creator': 'PDFCreator Version 1.2.1', '/Author': '', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1430690, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 115, '/Title': 'SECURITY TARGET OF MISTRAL IP ENCRYPTION DEVICE', '/Author': 'T0065286', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20150320191108+01'00'", '/ModDate': "D:20150320191108+01'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'ANSSI-CC-2014/91': 17}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 3, 'EAL4': 2, 'EAL 1': 1, 'EAL 5': 1, 'EAL 7': 1}, 'ITSEC': {'ITSEC E3 ElĂ©mentaire': 1}}, 'cc_sar': {'ADV': {'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.3': 2, 'ALC_FLR': 2, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.3': 3, 'AVA_VAN': 1}, 'ASE': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Thales': {'Thales': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 1}}, 'crypto_protocol': {'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'OpenSSL': {'OpenSSL': 1}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4, 'EAL3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 5, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.3': 8, 'ADV_TDS.2': 2, 'ADV_FSP.2': 2, 'ADV_FSP.4': 3, 'ADV_IMP.1': 3, 'ADV_TDS.3': 3}, 'AGD': {'AGD_OPE.1': 5, 'AGD_PRE.1': 3}, 'ALC': {'ALC_FLR.3': 7, 'ALC_CMC.3': 1, 'ALC_CMS.1': 1, 'ALC_DVS.1': 2, 'ALC_LCD.1': 3, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.2': 3, 'ATE_FUN.1': 5, 'ATE_COV.1': 2, 'ATE_DPT.1': 2}, 'AVA': {'AVA_VAN.3': 10}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 4, 'ASE_INT.1': 4, 'ASE_REQ.1': 2, 'ASE_REQ.2': 1, 'ASE_OBJ.2': 2, 'ASE_SPD.1': 3, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN_EXT.3': 12, 'FAU_STG_EXT.1': 15, 'FAU_STG_EXT.3': 12, 'FAU_GEN.1': 15, 'FAU_GEN': 9, 'FAU_GEN_EXT.3.1': 2, 'FAU_STG.1': 1, 'FAU_STG_EXT.1.1': 2, 'FAU_STG.3': 1, 'FAU_STG_EXT.3.1': 2, 'FAU_SEG.1': 2, 'FAU_GEN.1.1': 1, 'FAU_GEN.2': 4, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1}, 'FCS': {'FCS_RBG_EXT': 5, 'FCS_IPS_EXT': 4, 'FCS_CKM_EXT.4': 13, 'FCS_CKM_EXT.5': 17, 'FCS_COP': 86, 'FCS_RBG_EXT.1': 16, 'FCS_RBG_EXT.1.1': 2, 'FCS_RBG_EXT.1.2': 2, 'FCS_IPS_EXT.1': 20, 'FCS_COP.1': 17, 'FCS_IPS_EXT.1.1': 2, 'FCS_IPS_EXT.1.2': 2, 'FCS_IPS_EXT.1.3': 2, 'FCS_IPS_EXT.1.4': 2, 'FCS_IPS_EXT.1.5': 2, 'FCS_IPS_EXT.1.6': 2, 'FCS_IPS_EXT.1.7': 2, 'FCS_IPS_EXT.1.8': 3, 'FCS_CKM': 8, 'FCS_CKM.1': 26, 'FCS_CKM_EXT.4.1': 1, 'FCS_CKM.4': 16, 'FCS_CKM_EXT.5.1': 1, 'FCS_CKM_EXT.5.2': 1, 'FCS_CKM_EXT.5.3': 1, 'FCS_CKM_EXT': 31, 'FCS_CKM.3': 1}, 'FDP': {'FDP_ITC.1': 28, 'FDP_ITC.2': 36, 'FDP_UCT': 12, 'FDP_IFF': 29, 'FDP_UIT': 16, 'FDP_ITC': 21, 'FDP_ETC': 7, 'FDP_IFC': 31, 'FDP_RIP.2': 5, 'FDP_UCT.1': 2, 'FDP_UIT.1': 4, 'FDP_ETC.2': 4, 'FDP_IFC.1': 13, 'FDP_IFF.1': 21, 'FDP_RIP.2.1': 1, 'FDP_ACC.1': 7}, 'FIA': {'FIA_UIA_EXT': 15, 'FIA_PMG_EXT': 9, 'FIA_UAU_EXT.2': 9, 'FIA_UIA_EXT.1': 7, 'FIA_UIA_EXT.1.1': 1, 'FIA_UIA_EXT.1.2': 1, 'FIA_PMG_EXT.1': 5, 'FIA_PMG_EXT.1.1': 1, 'FIA_UAU': 13, 'FIA_UAU_EXT.2.1': 1, 'FIA_UID': 8, 'FIA_UAU_EXT': 5, 'FIA_AFL': 7, 'FIA_UID.2': 1, 'FIA_UAU.6': 1, 'FIA_UAU.7': 1, 'FIA_AFL.1': 2, 'FIA_AFL.1.1': 1, 'FIA_UIA': 1, 'FIA_UID.1': 4, 'FIA_UAU.1': 4}, 'FMT': {'FMT_MSA.3': 20, 'FMT_MTD': 43, 'FMT_SMR': 21, 'FMT_SMF.1': 29, 'FMT_MOF': 4, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMR.1': 16, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 1, 'FMT_MTD.1': 10, 'FMT_MDT': 1, 'FMT_SKP_EXT.1': 1, 'FMT_MSA.1': 1}, 'FPT': {'FPT_SIE_EXT': 8, 'FPT_SKP_EXT': 4, 'FPT_APW_EXT': 4, 'FPT_TUD_EXT': 19, 'FPT_SDP_EXT': 3, 'FPT_SIE_EXT.1': 6, 'FPT_SIE_EXT.2': 4, 'FPT_SIE_EXT.1.1': 1, 'FPT_SIE_EXT.2.1': 1, 'FPT_SKP_EXT.1': 8, 'FPT_SKP_EXT.1.1': 2, 'FPT_APW_EXT.1': 9, 'FPT_APW_EXT.1.1': 2, 'FPT_APW_EXT.1.2': 2, 'FPT_TUD_EXT.1': 7, 'FPT_TUD_EXT.1.1': 1, 'FPT_TUD_EXT.1.2': 1, 'FPT_TUD_EXT.1.3': 1, 'FPT_SDP_EXT.1': 5, 'FPT_SDP_EXT.2': 9, 'FPT_SDP_EXT.1.1': 1, 'FPT_SDP_EXT.2.1': 2, 'FPT_SDP_EXT.2.2': 2, 'FPT_STM.1': 14, 'FPT_TDC': 6, 'FPT_FLS.1': 6, 'FPT_TST.1': 4, 'FPT_STM.1.1': 1, 'FPT_TDC.1': 4, 'FPT_FLS.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 2, 'FPT_TST.1.3': 2}, 'FTA': {'FTA_SSL_EXT.1': 9, 'FTA_TAB.1': 5, 'FTA_SSL.1': 2, 'FTA_SSL_EXT.1.1': 1, 'FTA_SSL_EXT': 5, 'FTA_SSL': 5, 'FTA_TAB': 6, 'FTA_SSL.4': 1}, 'FTP': {'FTP_ITC.1': 11, 'FTP_ITC': 12, 'FTP_TRP.1': 6}}, 'cc_claims': {'D': {'D.APPLICATIVE_DATA': 6, 'D.TOPOLOGIC_INFO': 5, 'D.SECURITY_POLICIES': 23, 'D.CONFIG_PARAM': 22, 'D.SUPERVISION_DATA': 3, 'D.CRYPTO_KEYS': 18, 'D.CRYPTO_KEYS_PROTECTION_PWD': 3, 'D.AUDIT': 3, 'D.AUTHENTICATION_DATA': 11, 'D.SOFTWARE': 4, 'D.SWUPDATE_PUBLICKEYS': 5, 'D.TIME_BASE': 8, 'D.SOFTWARES': 3, 'D.CRYPTO_KEY': 4}, 'O': {'O.PROTECTED_COMMUNICATIONS': 10, 'O.POL_ENFORCEMENT': 6, 'O.FLOW_PARTITIONING': 5, 'O.AUDIT': 12, 'O.TIME_BASE': 5, 'O.AUDIT_PROTECTION': 6, 'O.SUPERVISION': 5, 'O.SUPERVISION_IMPACT': 4, 'O.VISUAL_ALARMS': 5, 'O.ROLES': 4, 'O.AUTHENTICATION_FAILURE': 4, 'O.DISPLAY_BANNER': 5, 'O.SESSION_LOCK': 5, 'O.MANAGEMENT': 6, 'O.VIEW': 5, 'O.POL_VIEW': 7, 'O.RESIDUAL_INFORMATION_CLEAR': 5, 'O.DATA_ERASURE': 6, 'O.LOCAL_DATA_PROTECTION': 11, 'O.SOFTWARE_UPDATES': 5, 'O.KEYS_INJECTION': 5, 'O.CRYPTOPERIOD': 4, 'O.CRYPTO_REGULATION': 7, 'O.SELF_TEST': 7, 'O.LED': 1, 'O.VISUAL': 1}, 'T': {'T.ADMIN_ERROR': 3, 'T.TSF_FAILURE': 3, 'T.UNDETECTED_ACTIONS': 3, 'T.UNAUTHORISED_ACCESS': 3, 'T.UNAUTHORISED_UPDATE': 3, 'T.USER_DATA_REUSE': 3, 'T.TIME_BASE': 3, 'T.RESIDUAL_DATA': 3}, 'A': {'A.NO_GENERAL_PURPOSE': 3, 'A.PHYSICAL_ENVIRONMENT_TOE': 3, 'A.SW_PROTECTION': 3, 'A.TRUSTED_ADMIN': 3, 'A.CONFIGURATION_CONTROL': 3, 'A.ALARM': 3, 'A.POLICIES_CONTINUITY': 3, 'A.TRUSTED_NETWORKS': 1, 'A.SECURED_MANAGEMENT_DEVICES': 3, 'A.ACCESS_CONTROL_MANAGEMENT_DEVICES': 3, 'A.PHYSICAL_ENVIRONMENT_MANAGEMENT_DEVICES': 3, 'A.AUDIT': 3, 'A.SGC_TO_FRONT-END': 3, 'A.STAND_ALONE_CEC': 3, 'A.KEY_TRANSPORTATION': 3, 'A.CEC_CRYPTO_REGULATION': 3, 'A.TRUSTED_NETWORK': 2}, 'R': {'R.ADMINISTRATOR': 13, 'R.SGC': 8, 'R.OPERATOR': 6, 'R.SGL': 1}, 'OE': {'OE.TRUSTED_ADMIN': 5, 'OE.ALARM': 3, 'OE.POLICIES_CONTINUITY': 3, 'OE.TRUSTED_NETWORKS': 1, 'OE.AUDIT_ANALYSIS': 2, 'OE.AUDIT_MNGT': 3, 'OE.PHYSICAL_ENVIRONMENT_TOE': 3, 'OE.LINUX_GUIDANCE': 3, 'OE.TOE_INTEGRITY': 8, 'OE.TOE_TRANSPORTATION': 3, 'OE.SECURED_SGC': 3, 'OE.ACCESS_CONTROL_SGC': 3, 'OE.SECURED_NTP_SERVER': 2, 'OE.ACCESS_CONTROL_NTP_SERVER': 3, 'OE.NTP_SERVER_LOCATION': 2, 'OE.ACCESS_CONTROL_SF': 2, 'OE.PHYSICAL_ENVIRONMENT_SGC': 3, 'OE.PHYSICAL_ENVIRONMENT_SF': 2, 'OE.PHYSICAL_ENVIRONMENT_NTP_SERVER': 3, 'OE.SGC_TO_FRONT-END': 3, 'OE.AUDIT_RECORD_SGC': 5, 'OE.DISPLAY_BANNER_SGC': 3, 'OE.SECURED_SGL': 2, 'OE.ACCESS_CONTROL_SGL': 2, 'OE.SGL_CONNECTION': 4, 'OE.PHYSICAL_ENVIRONMENT_SGL': 2, 'OE.SECURED_CEC': 3, 'OE.STAND_ALONE_CEC': 3, 'OE.ACCESS_CONTROL_CEC': 3, 'OE.PHYSICAL_ENVIRONMENT_CEC': 3, 'OE.KEY_TRANSPORTATION': 2, 'OE.CEC_CRYPTO_REGULATION': 6, 'OE.SW_PROTECTION': 3, 'OE.SW_UPDATE_KEY': 3, 'OE.TRUSTED_NETWORK': 2, 'OE.KEYS_TRANSPORTATION': 1}}, 'vendor': {'Thales': {'Thales': 4}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 16}}, 'constructions': {'MAC': {'HMAC': 2, 'HMAC-SHA-256': 2, 'HMAC-SHA-384': 2, 'HMAC-SHA-512': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 3}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 4, 'Diffie-Hellman': 1}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA512': 1, 'SHA-256': 1, 'SHA-384': 2}}}, 'crypto_scheme': {'MAC': {'MAC': 2}, 'KEX': {'Key Exchange': 1, 'Key exchange': 2}}, 'crypto_protocol': {'SSH': {'SSH': 2}, 'TLS': {'TLS': {'TLS': 1}}, 'IKE': {'IKEv2': 24, 'IKE': 65, 'IKEv1': 6}, 'IPsec': {'IPsec': 5}, 'VPN': {'VPN': 39}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RBG': 4}}, 'cipher_mode': {'CBC': {'CBC': 2}, 'GCM': {'GCM': 2}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS 197': 4, 'FIPS 186-4': 1, 'FIPS 180-3': 4, 'FIPS 198-1': 2}, 'NIST': {'NIST SP 800-38A': 2, 'NIST SP 800-38D': 2, 'SP 800-107': 1}, 'RFC': {'RFC 1042': 1, 'RFC 1213': 1, 'RFC 2408': 1, 'RFC 2409': 1, 'RFC 3566': 3, 'RFC 3602': 3, 'RFC 894': 1, 'RFC 5996': 3, 'RFC 4303': 2, 'RFC 4106': 2, 'RFC 4109': 1, 'RFC 4868': 3, 'RFC 5639': 1, 'RFC 5903': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'Mistral IP system are considered as part of the operational environment. Thus, those equipments are out of scope of the Target of Evaluation described in this Security Target. In particular, the Mistral': 1}}}.
    • The report_filename property was set to ANSSI-CC-2014_91.pdf.
    • The st_filename property was set to CC-2014-91_Cible-Lite.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2014/91.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_91.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC-2014-91_Cible-Lite.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The scheme_data property was set to {'product': 'Logiciel Mistral IP version 2.0.84', 'url': 'https://cyber.gouv.fr/produits-certifies/logiciel-mistral-ip-version-2084', 'description': 'Le produit certifiĂ©est le logiciel du chiffreur IP, version 2.0.84, embarquĂ© sur le boitier matĂ©riel Mistral, version 1.2.00, dĂ©veloppĂ© par Thales Communications.\n\nLe produit, est un Ă©quipement de chiffrement de niveau rĂ©seau (couche 3 du modèle OSI) assurant la protection des paquets IP. Il offre des services de protection de donnĂ©es Ă©changĂ©es sur des liens d’interconnexions de rĂ©seaux locaux', 'sponsor': 'Thales Communications', 'developer': 'Thales Communications', 'cert_id': '2014/91', 'level': 'EAL3+', 'enhanced': {'cert_id': '2014/91', 'certification_date': '22/12/2014', 'category': 'Produits rĂ©seau', 'cc_version': '', 'developer': 'Thales Communications', 'sponsor': 'Thales Communications', 'evaluation_facility': 'Amossys', 'level': 'EAL3+', 'protection_profile': '-', 'mutual_recognition': '', 'augmented': 'ALC_FLR.3, AVA_VAN.3', 'target_link': 'https://cyber.gouv.fr/sites/default/files/2015/03/CC-2014-91_Cible-Lite.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/2015/03/ANSSI-CC-2014_91.pdf'}}.
  • 31.07.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Logiciel Mistral IPversion 2.0.84 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Boundary Protection Devices and Systems",
  "cert_link": null,
  "dgst": "b2414d8a803f52fb",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2014/91",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2.0.84"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "ANSSI-CC-2014/91",
      "description": "Le produit certifi\u00e9est le logiciel du chiffreur IP, version 2.0.84, embarqu\u00e9 sur le boitier mat\u00e9riel Mistral, version 1.2.00, d\u00e9velopp\u00e9 par Thales Communications. Le produit, est un \u00e9quipement de chiffrement de niveau r\u00e9seau (couche 3 du mod\u00e8le OSI) assurant la protection des paquets IP. Il offre des services de protection de donn\u00e9es \u00e9chang\u00e9es sur des liens d\u2019interconnexions de r\u00e9seaux locaux",
      "developer": "Thales Communications",
      "enhanced": {
        "augmented": "ALC_FLR.3, AVA_VAN.3",
        "category": "Produits r\u00e9seau",
        "cc_version": "",
        "cert_id": "ANSSI-CC-2014/91",
        "certification_date": "2014-12-22",
        "developer": "Thales Communications",
        "evaluation_facility": "Amossys",
        "level": "EAL3+",
        "mutual_recognition": "",
        "protection_profile": "-",
        "report_link": "https://cyber.gouv.fr/sites/default/files/2015/03/ANSSI-CC-2014_91.pdf",
        "sponsor": "Thales Communications",
        "target_link": "https://cyber.gouv.fr/sites/default/files/2015/03/CC-2014-91_Cible-Lite.pdf"
      },
      "level": "EAL3+",
      "product": "Logiciel Mistral IP version 2.0.84",
      "sponsor": "Thales Communications",
      "url": "https://cyber.gouv.fr/produits-certifies/logiciel-mistral-ip-version-2084"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2015-06-10",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_91_M01.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "ANSSI-CC-2014/91-M01"
      }
    ]
  },
  "manufacturer": "Thales Communications \u0026 Security",
  "manufacturer_web": "https://www.thalescommuninc.com",
  "name": "Logiciel Mistral IPversion 2.0.84",
  "not_valid_after": "2019-12-22",
  "not_valid_before": "2014-12-22",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "ANSSI-CC-2014_91.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2014/91": 17
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_FSP": 1,
          "ADV_IMP": 1,
          "ADV_INT": 1,
          "ADV_SPM": 1,
          "ADV_TDS": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1,
          "ALC_DEL": 1,
          "ALC_DVS": 1,
          "ALC_FLR": 2,
          "ALC_FLR.3": 2,
          "ALC_LCD": 1,
          "ALC_TAT": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_REQ": 1,
          "ASE_SPD": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_DPT": 1,
          "ATE_FUN": 1,
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.3": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 3": 3,
          "EAL 5": 1,
          "EAL 7": 1,
          "EAL4": 2
        },
        "ITSEC": {
          "ITSEC E3 El\u00e9mentaire": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "OpenSSL": {
          "OpenSSL": 1
        }
      },
      "crypto_protocol": {
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 1,
          "CCMB-2009-07-002": 1,
          "CCMB-2009-07-003": 1,
          "CCMB-2009-07-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 5
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "",
      "/Creator": "PDFCreator Version 1.2.1",
      "/Keywords": "",
      "/ModDate": "",
      "/Producer": "GPL Ghostscript 9.02",
      "/Subject": "",
      "/Title": "ANSSI-CC-2014_91",
      "pdf_file_size_bytes": 790624,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 16
    },
    "st_filename": "CC-2014-91_Cible-Lite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 3
          }
        },
        "FF": {
          "DH": {
            "DH": 4,
            "Diffie-Hellman": 1
          },
          "DSA": {
            "DSA": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS_CONTROL_MANAGEMENT_DEVICES": 3,
          "A.ALARM": 3,
          "A.AUDIT": 3,
          "A.CEC_CRYPTO_REGULATION": 3,
          "A.CONFIGURATION_CONTROL": 3,
          "A.KEY_TRANSPORTATION": 3,
          "A.NO_GENERAL_PURPOSE": 3,
          "A.PHYSICAL_ENVIRONMENT_MANAGEMENT_DEVICES": 3,
          "A.PHYSICAL_ENVIRONMENT_TOE": 3,
          "A.POLICIES_CONTINUITY": 3,
          "A.SECURED_MANAGEMENT_DEVICES": 3,
          "A.SGC_TO_FRONT-END": 3,
          "A.STAND_ALONE_CEC": 3,
          "A.SW_PROTECTION": 3,
          "A.TRUSTED_ADMIN": 3,
          "A.TRUSTED_NETWORK": 2,
          "A.TRUSTED_NETWORKS": 1
        },
        "D": {
          "D.APPLICATIVE_DATA": 6,
          "D.AUDIT": 3,
          "D.AUTHENTICATION_DATA": 11,
          "D.CONFIG_PARAM": 22,
          "D.CRYPTO_KEY": 4,
          "D.CRYPTO_KEYS": 18,
          "D.CRYPTO_KEYS_PROTECTION_PWD": 3,
          "D.SECURITY_POLICIES": 23,
          "D.SOFTWARE": 4,
          "D.SOFTWARES": 3,
          "D.SUPERVISION_DATA": 3,
          "D.SWUPDATE_PUBLICKEYS": 5,
          "D.TIME_BASE": 8,
          "D.TOPOLOGIC_INFO": 5
        },
        "O": {
          "O.AUDIT": 12,
          "O.AUDIT_PROTECTION": 6,
          "O.AUTHENTICATION_FAILURE": 4,
          "O.CRYPTOPERIOD": 4,
          "O.CRYPTO_REGULATION": 7,
          "O.DATA_ERASURE": 6,
          "O.DISPLAY_BANNER": 5,
          "O.FLOW_PARTITIONING": 5,
          "O.KEYS_INJECTION": 5,
          "O.LED": 1,
          "O.LOCAL_DATA_PROTECTION": 11,
          "O.MANAGEMENT": 6,
          "O.POL_ENFORCEMENT": 6,
          "O.POL_VIEW": 7,
          "O.PROTECTED_COMMUNICATIONS": 10,
          "O.RESIDUAL_INFORMATION_CLEAR": 5,
          "O.ROLES": 4,
          "O.SELF_TEST": 7,
          "O.SESSION_LOCK": 5,
          "O.SOFTWARE_UPDATES": 5,
          "O.SUPERVISION": 5,
          "O.SUPERVISION_IMPACT": 4,
          "O.TIME_BASE": 5,
          "O.VIEW": 5,
          "O.VISUAL": 1,
          "O.VISUAL_ALARMS": 5
        },
        "OE": {
          "OE.ACCESS_CONTROL_CEC": 3,
          "OE.ACCESS_CONTROL_NTP_SERVER": 3,
          "OE.ACCESS_CONTROL_SF": 2,
          "OE.ACCESS_CONTROL_SGC": 3,
          "OE.ACCESS_CONTROL_SGL": 2,
          "OE.ALARM": 3,
          "OE.AUDIT_ANALYSIS": 2,
          "OE.AUDIT_MNGT": 3,
          "OE.AUDIT_RECORD_SGC": 5,
          "OE.CEC_CRYPTO_REGULATION": 6,
          "OE.DISPLAY_BANNER_SGC": 3,
          "OE.KEYS_TRANSPORTATION": 1,
          "OE.KEY_TRANSPORTATION": 2,
          "OE.LINUX_GUIDANCE": 3,
          "OE.NTP_SERVER_LOCATION": 2,
          "OE.PHYSICAL_ENVIRONMENT_CEC": 3,
          "OE.PHYSICAL_ENVIRONMENT_NTP_SERVER": 3,
          "OE.PHYSICAL_ENVIRONMENT_SF": 2,
          "OE.PHYSICAL_ENVIRONMENT_SGC": 3,
          "OE.PHYSICAL_ENVIRONMENT_SGL": 2,
          "OE.PHYSICAL_ENVIRONMENT_TOE": 3,
          "OE.POLICIES_CONTINUITY": 3,
          "OE.SECURED_CEC": 3,
          "OE.SECURED_NTP_SERVER": 2,
          "OE.SECURED_SGC": 3,
          "OE.SECURED_SGL": 2,
          "OE.SGC_TO_FRONT-END": 3,
          "OE.SGL_CONNECTION": 4,
          "OE.STAND_ALONE_CEC": 3,
          "OE.SW_PROTECTION": 3,
          "OE.SW_UPDATE_KEY": 3,
          "OE.TOE_INTEGRITY": 8,
          "OE.TOE_TRANSPORTATION": 3,
          "OE.TRUSTED_ADMIN": 5,
          "OE.TRUSTED_NETWORK": 2,
          "OE.TRUSTED_NETWORKS": 1
        },
        "R": {
          "R.ADMINISTRATOR": 13,
          "R.OPERATOR": 6,
          "R.SGC": 8,
          "R.SGL": 1
        },
        "T": {
          "T.ADMIN_ERROR": 3,
          "T.RESIDUAL_DATA": 3,
          "T.TIME_BASE": 3,
          "T.TSF_FAILURE": 3,
          "T.UNAUTHORISED_ACCESS": 3,
          "T.UNAUTHORISED_UPDATE": 3,
          "T.UNDETECTED_ACTIONS": 3,
          "T.USER_DATA_REUSE": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 5,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.3": 8,
          "ADV_FSP.4": 3,
          "ADV_IMP.1": 3,
          "ADV_TDS.1": 2,
          "ADV_TDS.2": 2,
          "ADV_TDS.3": 3
        },
        "AGD": {
          "AGD_OPE.1": 5,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 2,
          "ALC_FLR.3": 7,
          "ALC_LCD.1": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 4,
          "ASE_INT.1": 4,
          "ASE_OBJ.2": 2,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 3,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 3,
          "ATE_DPT.1": 2,
          "ATE_FUN.1": 5
        },
        "AVA": {
          "AVA_VAN.3": 10
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 4,
          "EAL3 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 9,
          "FAU_GEN.1": 15,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 4,
          "FAU_GEN.2.1": 1,
          "FAU_GEN_EXT.3": 12,
          "FAU_GEN_EXT.3.1": 2,
          "FAU_SEG.1": 2,
          "FAU_STG.1": 1,
          "FAU_STG.3": 1,
          "FAU_STG_EXT.1": 15,
          "FAU_STG_EXT.1.1": 2,
          "FAU_STG_EXT.3": 12,
          "FAU_STG_EXT.3.1": 2
        },
        "FCS": {
          "FCS_CKM": 8,
          "FCS_CKM.1": 26,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 16,
          "FCS_CKM_EXT": 31,
          "FCS_CKM_EXT.4": 13,
          "FCS_CKM_EXT.4.1": 1,
          "FCS_CKM_EXT.5": 17,
          "FCS_CKM_EXT.5.1": 1,
          "FCS_CKM_EXT.5.2": 1,
          "FCS_CKM_EXT.5.3": 1,
          "FCS_COP": 86,
          "FCS_COP.1": 17,
          "FCS_IPS_EXT": 4,
          "FCS_IPS_EXT.1": 20,
          "FCS_IPS_EXT.1.1": 2,
          "FCS_IPS_EXT.1.2": 2,
          "FCS_IPS_EXT.1.3": 2,
          "FCS_IPS_EXT.1.4": 2,
          "FCS_IPS_EXT.1.5": 2,
          "FCS_IPS_EXT.1.6": 2,
          "FCS_IPS_EXT.1.7": 2,
          "FCS_IPS_EXT.1.8": 3,
          "FCS_RBG_EXT": 5,
          "FCS_RBG_EXT.1": 16,
          "FCS_RBG_EXT.1.1": 2,
          "FCS_RBG_EXT.1.2": 2
        },
        "FDP": {
          "FDP_ACC.1": 7,
          "FDP_ETC": 7,
          "FDP_ETC.2": 4,
          "FDP_IFC": 31,
          "FDP_IFC.1": 13,
          "FDP_IFF": 29,
          "FDP_IFF.1": 21,
          "FDP_ITC": 21,
          "FDP_ITC.1": 28,
          "FDP_ITC.2": 36,
          "FDP_RIP.2": 5,
          "FDP_RIP.2.1": 1,
          "FDP_UCT": 12,
          "FDP_UCT.1": 2,
          "FDP_UIT": 16,
          "FDP_UIT.1": 4
        },
        "FIA": {
          "FIA_AFL": 7,
          "FIA_AFL.1": 2,
          "FIA_AFL.1.1": 1,
          "FIA_PMG_EXT": 9,
          "FIA_PMG_EXT.1": 5,
          "FIA_PMG_EXT.1.1": 1,
          "FIA_UAU": 13,
          "FIA_UAU.1": 4,
          "FIA_UAU.6": 1,
          "FIA_UAU.7": 1,
          "FIA_UAU_EXT": 5,
          "FIA_UAU_EXT.2": 9,
          "FIA_UAU_EXT.2.1": 1,
          "FIA_UIA": 1,
          "FIA_UIA_EXT": 15,
          "FIA_UIA_EXT.1": 7,
          "FIA_UIA_EXT.1.1": 1,
          "FIA_UIA_EXT.1.2": 1,
          "FIA_UID": 8,
          "FIA_UID.1": 4,
          "FIA_UID.2": 1
        },
        "FMT": {
          "FMT_MDT": 1,
          "FMT_MOF": 4,
          "FMT_MOF.1": 1,
          "FMT_MSA.1": 1,
          "FMT_MSA.3": 20,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 43,
          "FMT_MTD.1": 10,
          "FMT_SKP_EXT.1": 1,
          "FMT_SMF.1": 29,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 21,
          "FMT_SMR.1": 16
        },
        "FPT": {
          "FPT_APW_EXT": 4,
          "FPT_APW_EXT.1": 9,
          "FPT_APW_EXT.1.1": 2,
          "FPT_APW_EXT.1.2": 2,
          "FPT_FLS.1": 6,
          "FPT_FLS.1.1": 1,
          "FPT_SDP_EXT": 3,
          "FPT_SDP_EXT.1": 5,
          "FPT_SDP_EXT.1.1": 1,
          "FPT_SDP_EXT.2": 9,
          "FPT_SDP_EXT.2.1": 2,
          "FPT_SDP_EXT.2.2": 2,
          "FPT_SIE_EXT": 8,
          "FPT_SIE_EXT.1": 6,
          "FPT_SIE_EXT.1.1": 1,
          "FPT_SIE_EXT.2": 4,
          "FPT_SIE_EXT.2.1": 1,
          "FPT_SKP_EXT": 4,
          "FPT_SKP_EXT.1": 8,
          "FPT_SKP_EXT.1.1": 2,
          "FPT_STM.1": 14,
          "FPT_STM.1.1": 1,
          "FPT_TDC": 6,
          "FPT_TDC.1": 4,
          "FPT_TST.1": 4,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 2,
          "FPT_TST.1.3": 2,
          "FPT_TUD_EXT": 19,
          "FPT_TUD_EXT.1": 7,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.1.3": 1
        },
        "FTA": {
          "FTA_SSL": 5,
          "FTA_SSL.1": 2,
          "FTA_SSL.4": 1,
          "FTA_SSL_EXT": 5,
          "FTA_SSL_EXT.1": 9,
          "FTA_SSL_EXT.1.1": 1,
          "FTA_TAB": 6,
          "FTA_TAB.1": 5
        },
        "FTP": {
          "FTP_ITC": 12,
          "FTP_ITC.1": 11,
          "FTP_TRP.1": 6
        }
      },
      "certification_process": {
        "OutOfScope": {
          "Mistral IP system are considered as part of the operational environment. Thus, those equipments are out of scope of the Target of Evaluation described in this Security Target. In particular, the Mistral": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "GCM": {
          "GCM": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "IKE": {
          "IKE": 65,
          "IKEv1": 6,
          "IKEv2": 24
        },
        "IPsec": {
          "IPsec": 5
        },
        "SSH": {
          "SSH": 2
        },
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 39
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1,
          "Key exchange": 2
        },
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA2": {
            "SHA-256": 1,
            "SHA-384": 2,
            "SHA512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "PRNG": 1
        },
        "RNG": {
          "RBG": 4
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "FIPS": {
          "FIPS 180-3": 4,
          "FIPS 186-4": 1,
          "FIPS 197": 4,
          "FIPS 198-1": 2,
          "FIPS PUB 197": 1
        },
        "NIST": {
          "NIST SP 800-38A": 2,
          "NIST SP 800-38D": 2,
          "SP 800-107": 1
        },
        "RFC": {
          "RFC 1042": 1,
          "RFC 1213": 1,
          "RFC 2408": 1,
          "RFC 2409": 1,
          "RFC 3566": 3,
          "RFC 3602": 3,
          "RFC 4106": 2,
          "RFC 4109": 1,
          "RFC 4303": 2,
          "RFC 4868": 3,
          "RFC 5639": 1,
          "RFC 5903": 1,
          "RFC 5996": 3,
          "RFC 894": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 16
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 2,
            "HMAC-SHA-256": 2,
            "HMAC-SHA-384": 2,
            "HMAC-SHA-512": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Thales": {
          "Thales": 4
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "T0065286",
      "/CreationDate": "D:20150320191108+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20150320191108+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Title": "SECURITY TARGET OF MISTRAL IP ENCRYPTION DEVICE",
      "pdf_file_size_bytes": 1430690,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 115
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014_91.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.3",
      "EAL3+",
      "ALC_FLR.3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC-2014-91_Cible-Lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "81e5c14576ae940c8e90a725a859542c026d9f5b4e1bff697b4a9431219f62c5",
      "txt_hash": "5a675cc86b7667e93a579a1019b5e811c879abe0101c800997bd905b6870eb9c"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "32152dae4edacf5960e1f9332142b5696abf6f7d312f96dfdd58e44d9d2a64b9",
      "txt_hash": "e1b4dc8f1d687e37e1ae71776f01f307372983276405424a60a1444b4b10164d"
    }
  },
  "status": "archived"
}