BULL Trustway PCI 2400 (PCA2 version 76675628-115A S302)

CSV information

Status archived
Valid from 26.11.2004
Valid until 01.09.2019
Scheme 🇫🇷 FR
Manufacturer BULL S.A.
Category Data Protection
Security level AVA_VLA.4, ADV_IMP.2, AVA_CCA.1, EAL4+, ALC_FLR.3
Maintenance updates Rapport de maintenance M-2007/09 (25.06.2007) Certification report

Heuristics summary

Certificate ID: ANSSI-CC-2004/34

Certificate

certificate file processing did not finish successfully.
Download pdf: ERROR
Convert pdf to text: ERROR
Extract keywords: ERROR

Certification report

Extracted keywords

Symmetric Algorithms
RC4, DES, HMAC
Hash functions
SHA-1, MD5

Security level
EAL7, EAL4, EAL41, EAL1, EAL3, EAL5, ITSEC E6 et
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_IMP.2, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_FLR, ALC_FLR.3, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_DVS, ALC_TAT, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_CCA, AVA_VLA.4, AVA_CCA.1, AVA_MSU.2, AVA_SOF.1, AVA_MSU, AVA_SOF, AVA_VLA, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_STG.2, FCS_RND.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FDP_BKP.1, FDP_ACC.1, FDP_ACF.1, FDP_ETC.1, FDP_IFC.1, FDP_IFF.4, FDP_RIP.1, FDP_SDI.2, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UID.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FPT_TRP.1, FPT_AMT.1, FPT_FLS.1, FPT_ITC.1, FPT_ITI.1, FPT_PHP.2, FPT_PHP.3, FPT_RCV.1, FPT_STM.1, FPT_TST.1, FTP_TRP.1
Certificates
Rapport de certification 2004/34
Evaluation facilities
SERMA, Serma Technologies

Side-channel analysis
SPA, DPA

Standards
PKCS#11, ISO/IEC 15408:1999, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title Rapport de certification 2004/34
Subject BULL TrustWay PCI 2400 (PCA2 version 76675628-115A S302)
Keywords CER/F/07.3
Author Patrick REDON
Creation date D:20041126175603+01'00'
Modification date D:20041126175737+01'00'
Pages 30
Creator Acrobat PDFMaker 5.0 pour Word
Producer Acrobat Distiller 5.0 (Windows)

Security target

Extracted keywords

Symmetric Algorithms
AES, RC4, DES, 3DES, TDES, HMAC
Asymmetric Algorithms
RSA 512
Hash functions
SHA-1, MD5
Schemes
MAC
Block cipher modes
ECB, CBC

Vendor
Gemplus

Security level
EAL4, EAL 4, EAL 4 augmented, EAL4 augmented
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_CAP.2, ACM_CAP.3, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP.1, ADV_IMP.1, ADV_HLD.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ALC_FLR.3.3, ALC_FLR.3.2, ALC_FLR.3.1, ALC_FLR.3.4, ALC_FLR.3.6, ALC_FLR.3.7, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_CCA.1, AVA_MSU.2, AVA_SOF.1, AVA_VLA.4
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_STG, FAU_SAR.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_STG.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1, FAU_GEN, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP, FCS_RND.1, FCS_RND, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1, FCS_RND.1.1, FCS_RND.1.2, FCS_CKM, FCS_RNG.1, FDP_ACC, FDP_ACF, FDP_BKP.1, FDP_ETC.1, FDP_IFC, FDP_IFF, FDP_RIP.1, FDP_SDI.2, FDP_UIT.1, FDP_BKP, FDP_BKP.1.4, FDP_ACC.1, FDP_ACF.1, FDP_BKP.1.1, FDP_BKP.1.2, FDP_BKP.1.3, FDP_BKP.1.5, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFC.1, FDP_IFF.4, FDP_RIP.1.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UIT.1.1, FDP_UIT.1.2, FDP_IFF.1, FDP_AFC, FDP_ITC.1, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UID.1, FIA_UAU, FIA_UID, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA, FMT_MSA.2, FMT_MSA.3, FMT_MTD, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_AMT.1, FPT_FLS.1, FPT_ITC.1, FPT_ITI.1, FPT_PHP.2, FPT_PHP.3, FPT_RCV.1, FPT_STM.1, FPT_TST.1, FPT_AMT.1.1, FPT_FLS.1.1, FPT_ITC.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_PHP.2.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_PHP.3.1, FPT_RCV.1.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_TRP, FTP_TRP, FTP_TRP.1

Side-channel analysis
Side-channel, Side-channels, side-channels, side-channel, SPA, DPA, timing attacks, physical tampering, Malfunction, malfunction

Standards
FIPS140-1, FIPS PUB 186-2, FIPS140-2, FIPS46-3, FIPS180-1, FIPS 140, FIPS 140-2, FIPS 46-3, FIPS PUB 140-2, FIPS 180-1, PKCS#11, PKCS#1, PKCS#8, RFC2104, RFC1321, RFC 1321, RFC 2104

File metadata

Title Microsoft Word - cible_2004_34.doc
Author webssi
Creation date D:20050104182856+01'00'
Modification date D:20050104182856+01'00'
Pages 102
Creator PScript5.dll Version 5.2
Producer Acrobat Distiller 5.0 (Windows)

Heuristics

Certificate ID: ANSSI-CC-2004/34

Extracted SARs

ADV_FSP.2, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_CCA.1, AVA_MSU.2, AVA_SOF.1, AVA_VLA.4

References

No references are available for this certificate.

Updates

  • 10.02.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': None, 'eal': 'EAL4+'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
    • The scheme_data property was set to {'product': 'BULL TrustWay PCI 2400 (PCA2 version 76675628-115A S302)', 'url': 'https://cyber.gouv.fr/produits-certifies/bull-trustway-pci-2400-pca2-version-76675628-115a-s302', 'description': 'Le produit évalué est la carte cryptographique de BULL - TrustWay. Elle offre des fonctions de chiffrement et de signature, utilisant divers algorithmes : DES et 3-DES, RC4, RSA, SHA-1, MD5. L'utilisation de la carte se fait par l'intermédiaire d'une interface PKCS#11. Cela correspond aux éléments matériels (circuit imprimé et composants électroniques, configuration du FCE - FPGA', 'sponsor': 'Bull TrustWay', 'developer': 'Bull TrustWay', 'cert_id': 'ANSSI-CC-2004/34', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2004/34', 'certification_date': '2004-11-26', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 2.1', 'developer': 'Bull TrustWay', 'sponsor': 'Bull TrustWay', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL4+', 'protection_profile': 'PP/0308 (CMCSO with backup)', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_FLR.3, AVA_CCA.1, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2004-34en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2004-34fr.pdf'}}.
  • 03.02.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 27.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'BULL TrustWay PCI 2400 (PCA2 version 76675628-115A S302)', 'url': 'https://cyber.gouv.fr/produits-certifies/bull-trustway-pci-2400-pca2-version-76675628-115a-s302', 'description': 'Le produit évalué est la carte cryptographique de BULL - TrustWay. Elle offre des fonctions de chiffrement et de signature, utilisant divers algorithmes : DES et 3-DES, RC4, RSA, SHA-1, MD5. L'utilisation de la carte se fait par l'intermédiaire d'une interface PKCS#11. Cela correspond aux éléments matériels (circuit imprimé et composants électroniques, configuration du FCE - FPGA', 'sponsor': 'Bull TrustWay', 'developer': 'Bull TrustWay', 'cert_id': 'ANSSI-CC-2004/34', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2004/34', 'certification_date': '2004-11-26', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 2.1', 'developer': 'Bull TrustWay', 'sponsor': 'Bull TrustWay', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL4+', 'protection_profile': 'PP/0308 (CMCSO with backup)', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_FLR.3, AVA_CCA.1, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2004-34en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2004-34fr.pdf'}}.
  • 06.01.2025 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 16.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'BULL TrustWay PCI 2400 (PCA2 version 76675628-115A S302)', 'url': 'https://cyber.gouv.fr/produits-certifies/bull-trustway-pci-2400-pca2-version-76675628-115a-s302', 'description': 'Le produit évalué est la carte cryptographique de BULL - TrustWay. Elle offre des fonctions de chiffrement et de signature, utilisant divers algorithmes : DES et 3-DES, RC4, RSA, SHA-1, MD5. L'utilisation de la carte se fait par l'intermédiaire d'une interface PKCS#11. Cela correspond aux éléments matériels (circuit imprimé et composants électroniques, configuration du FCE - FPGA', 'sponsor': 'Bull TrustWay', 'developer': 'Bull TrustWay', 'cert_id': 'ANSSI-CC-2004/34', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2004/34', 'certification_date': '2004-11-26', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 2.1', 'developer': 'Bull TrustWay', 'sponsor': 'Bull TrustWay', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL4+', 'protection_profile': 'PP/0308 (CMCSO with backup)', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_FLR.3, AVA_CCA.1, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2004-34en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2004-34fr.pdf'}}.
  • 09.12.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'BULL TrustWay PCI 2400 (PCA2 version 76675628-115A S302)', 'url': 'https://cyber.gouv.fr/produits-certifies/bull-trustway-pci-2400-pca2-version-76675628-115a-s302', 'description': 'Le produit évalué est la carte cryptographique de BULL - TrustWay. Elle offre des fonctions de chiffrement et de signature, utilisant divers algorithmes : DES et 3-DES, RC4, RSA, SHA-1, MD5. L'utilisation de la carte se fait par l'intermédiaire d'une interface PKCS#11. Cela correspond aux éléments matériels (circuit imprimé et composants électroniques, configuration du FCE - FPGA', 'sponsor': 'Bull TrustWay', 'developer': 'Bull TrustWay', 'cert_id': 'ANSSI-CC-2004/34', 'level': 'EAL4+', 'enhanced': {'cert_id': 'ANSSI-CC-2004/34', 'certification_date': '2004-11-26', 'category': 'Produits pour ordinateur personnel et serveur', 'cc_version': 'Critères Communs version 2.1', 'developer': 'Bull TrustWay', 'sponsor': 'Bull TrustWay', 'evaluation_facility': 'Serma Technologies', 'level': 'EAL4+', 'protection_profile': 'PP/0308 (CMCSO with backup)', 'mutual_recognition': 'SOG-IS CCRA', 'augmented': 'ADV_IMP.2, ALC_FLR.3, AVA_CCA.1, AVA_VLA.4', 'target_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi-cible_2004-34en.pdf', 'report_link': 'https://cyber.gouv.fr/sites/default/files/IMG/certificat/dcssi_2004-34fr.pdf'}}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '60c1b9146641083400778a3b27f969e55fc11336393415045c17db42e9032a60', 'txt_hash': '609b1486abfa62891488d32b01cf03cd0061b6b4c2b90664318ea9f979748dc8'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '874bb49a8563dc32051a640dc9928a79c078d4f753316b2991d6b72fb54dbdaa', 'txt_hash': '8afe0dbdeb6a8f0fde20e181efb1ef51d66ed5d0435f9e2db132d635767ff7d5'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 907122, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 30, '/Author': 'Patrick REDON', '/CreationDate': "D:20041126175603+01'00'", '/Creator': 'Acrobat PDFMaker 5.0 pour Word', '/Keywords': 'CER/F/07.3', '/ModDate': "D:20041126175737+01'00'", '/Producer': 'Acrobat Distiller 5.0 (Windows)', '/Subject': 'BULL TrustWay PCI 2400 (PCA2 version 76675628-115A S302)', '/Title': 'Rapport de certification 2004/34', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'mailto:[email protected]']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 548753, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 102, '/CreationDate': "D:20050104182856+01'00'", '/ModDate': "D:20050104182856+01'00'", '/Producer': 'Acrobat Distiller 5.0 (Windows)', '/Author': 'webssi', '/Creator': 'PScript5.dll Version 5.2', '/Title': 'Microsoft Word - cible_2004_34.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {'FR': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'FR': {'Rapport de certification 2004/34': 15}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL7': 2, 'EAL4': 1, 'EAL41': 1, 'EAL1': 1, 'EAL3': 1, 'EAL5': 1}, 'ITSEC': {'ITSEC E6 et': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_SCP.2': 1, 'ACM_AUT': 1, 'ACM_CAP': 1, 'ACM_SCP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 1, 'ADO_DEL': 1, 'ADO_IGS': 1}, 'ADV': {'ADV_IMP.2': 3, 'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 1, 'ADV_FSP': 1, 'ADV_HLD': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_LLD': 1, 'ADV_RCR': 1, 'ADV_SPM': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 1, 'AGD_USR': 1}, 'ALC': {'ALC_FLR': 2, 'ALC_FLR.3': 2, 'ALC_DVS.1': 4, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1, 'ALC_DVS': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_CCA': 2, 'AVA_VLA.4': 3, 'AVA_CCA.1': 2, 'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_MSU': 1, 'AVA_SOF': 1, 'AVA_VLA': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 2, 'FAU_GEN.2': 2, 'FAU_STG.2': 2}, 'FCS': {'FCS_RND.1': 3, 'FCS_CKM.1': 2, 'FCS_CKM.2': 2, 'FCS_CKM.4': 2, 'FCS_COP.1': 2}, 'FDP': {'FDP_BKP.1': 3, 'FDP_ACC.1': 2, 'FDP_ACF.1': 2, 'FDP_ETC.1': 2, 'FDP_IFC.1': 2, 'FDP_IFF.4': 2, 'FDP_RIP.1': 2, 'FDP_SDI.2': 2}, 'FIA': {'FIA_AFL.1': 2, 'FIA_ATD.1': 2, 'FIA_SOS.1': 2, 'FIA_UAU.1': 2, 'FIA_UID.1': 2}, 'FMT': {'FMT_MOF.1': 2, 'FMT_MSA.1': 2, 'FMT_MSA.2': 2, 'FMT_MSA.3': 2, 'FMT_MTD.1': 2, 'FMT_SMF.1': 2, 'FMT_SMR.1': 2}, 'FPT': {'FPT_TRP.1': 1, 'FPT_AMT.1': 2, 'FPT_FLS.1': 2, 'FPT_ITC.1': 2, 'FPT_ITI.1': 2, 'FPT_PHP.2': 2, 'FPT_PHP.3': 2, 'FPT_RCV.1': 2, 'FPT_STM.1': 2, 'FPT_TST.1': 2}, 'FTP': {'FTP_TRP.1': 3}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'Serma': {'SERMA': 1, 'Serma Technologies': 2}}, 'symmetric_crypto': {'AES_competition': {'RC': {'RC4': 1}}, 'DES': {'DES': {'DES': 4}}, 'constructions': {'MAC': {'HMAC': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}, 'MD': {'MD5': {'MD5': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 2, 'DPA': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#11': 3}, 'ISO': {'ISO/IEC 15408:1999': 1}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 27, 'EAL 4': 1, 'EAL 4 augmented': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 12, 'ACM_CAP.4': 23, 'ACM_SCP.2': 8, 'ACM_CAP.2': 1, 'ACM_CAP.3': 4}, 'ADO': {'ADO_DEL.2': 13, 'ADO_IGS.1': 10}, 'ADV': {'ADV_FSP.2': 17, 'ADV_HLD.2': 18, 'ADV_IMP.2': 17, 'ADV_LLD.1': 18, 'ADV_RCR.1': 10, 'ADV_SPM.1': 13, 'ADV_FSP.1': 17, 'ADV_IMP.1': 5, 'ADV_HLD.1': 4}, 'AGD': {'AGD_ADM.1': 21, 'AGD_USR.1': 16}, 'ALC': {'ALC_DVS.1': 11, 'ALC_FLR.3': 7, 'ALC_LCD.1': 11, 'ALC_TAT.1': 11, 'ALC_FLR.3.3': 3, 'ALC_FLR.3.2': 2, 'ALC_FLR.3.1': 1, 'ALC_FLR.3.4': 1, 'ALC_FLR.3.6': 1, 'ALC_FLR.3.7': 1}, 'ATE': {'ATE_COV.2': 9, 'ATE_DPT.1': 7, 'ATE_FUN.1': 15, 'ATE_IND.2': 8}, 'AVA': {'AVA_CCA.1': 27, 'AVA_MSU.2': 12, 'AVA_SOF.1': 10, 'AVA_VLA.4': 23}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 22, 'FAU_GEN.2': 11, 'FAU_STG': 16, 'FAU_SAR.1': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_STG.2': 3, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1': 2, 'FAU_GEN': 1}, 'FCS': {'FCS_CKM.1': 32, 'FCS_CKM.2': 20, 'FCS_CKM.4': 19, 'FCS_COP': 75, 'FCS_RND.1': 12, 'FCS_RND': 4, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1': 28, 'FCS_RND.1.1': 2, 'FCS_RND.1.2': 2, 'FCS_CKM': 4, 'FCS_RNG.1': 1}, 'FDP': {'FDP_ACC': 62, 'FDP_ACF': 50, 'FDP_BKP.1': 30, 'FDP_ETC.1': 8, 'FDP_IFC': 24, 'FDP_IFF': 20, 'FDP_RIP.1': 7, 'FDP_SDI.2': 7, 'FDP_UIT.1': 6, 'FDP_BKP': 4, 'FDP_BKP.1.4': 3, 'FDP_ACC.1': 5, 'FDP_ACF.1': 20, 'FDP_BKP.1.1': 2, 'FDP_BKP.1.2': 2, 'FDP_BKP.1.3': 2, 'FDP_BKP.1.5': 2, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_IFC.1': 2, 'FDP_IFF.4': 4, 'FDP_RIP.1.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_IFF.1': 4, 'FDP_AFC': 3, 'FDP_ITC.1': 1}, 'FIA': {'FIA_AFL.1': 10, 'FIA_ATD.1': 7, 'FIA_SOS.1': 7, 'FIA_UAU.1': 13, 'FIA_UID.1': 14, 'FIA_UAU': 5, 'FIA_UID': 7, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MOF.1': 17, 'FMT_MSA': 25, 'FMT_MSA.2': 14, 'FMT_MSA.3': 17, 'FMT_MTD': 50, 'FMT_SMF.1': 18, 'FMT_SMR.1': 18, 'FMT_MSA.1': 3, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 5, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_AMT.1': 12, 'FPT_FLS.1': 14, 'FPT_ITC.1': 9, 'FPT_ITI.1': 11, 'FPT_PHP.2': 17, 'FPT_PHP.3': 10, 'FPT_RCV.1': 8, 'FPT_STM.1': 13, 'FPT_TST.1': 21, 'FPT_AMT.1.1': 1, 'FPT_FLS.1.1': 1, 'FPT_ITC.1.1': 1, 'FPT_ITI.1.1': 1, 'FPT_ITI.1.2': 1, 'FPT_PHP.2.1': 1, 'FPT_PHP.2.2': 1, 'FPT_PHP.2.3': 1, 'FPT_PHP.3.1': 1, 'FPT_RCV.1.1': 1, 'FPT_STM.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_TRP': 1}, 'FTP': {'FTP_TRP': 18, 'FTP_TRP.1': 6}}, 'cc_claims': {}, 'vendor': {'Gemplus': {'Gemplus': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}, 'RC': {'RC4': 18}}, 'DES': {'DES': {'DES': 12}, '3DES': {'3DES': 7, 'TDES': 18}}, 'constructions': {'MAC': {'HMAC': 19}}}, 'asymmetric_crypto': {'RSA': {'RSA 512': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}, 'MD': {'MD5': {'MD5': 20}}}, 'crypto_scheme': {'MAC': {'MAC': 8}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'ECB': {'ECB': 3}, 'CBC': {'CBC': 4}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Side-channel': 3, 'Side-channels': 4, 'side-channels': 8, 'side-channel': 4, 'SPA': 1, 'DPA': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 18, 'Malfunction': 7, 'malfunction': 4}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS140-1': 1, 'FIPS PUB 186-2': 7, 'FIPS140-2': 2, 'FIPS46-3': 3, 'FIPS180-1': 1, 'FIPS 140': 1, 'FIPS 140-2': 1, 'FIPS 46-3': 1, 'FIPS PUB 140-2': 1, 'FIPS 180-1': 1}, 'PKCS': {'PKCS#11': 7, 'PKCS#1': 11, 'PKCS#8': 3}, 'RFC': {'RFC2104': 5, 'RFC1321': 1, 'RFC 1321': 1, 'RFC 2104': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 2004_34.pdf.
    • The st_filename property was set to cible2004_34.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to ANSSI-CC-2004/34.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2004_34.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2004_34.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name BULL Trustway PCI 2400 (PCA2 version 76675628-115A S302) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Data Protection",
  "cert_link": null,
  "dgst": "b278cf9ab3b5931f",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2004/34",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ENV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_DES",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_PPC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_CCA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "2400",
        "76675628"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2007-06-25",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/M-2007_09fr.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Rapport de maintenance M-2007/09"
      }
    ]
  },
  "manufacturer": "BULL S.A.",
  "manufacturer_web": "https://www.bull.com",
  "name": "BULL Trustway PCI 2400 (PCA2 version 76675628-115A S302)",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2004-11-26",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "2004_34.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "Rapport de certification 2004/34": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 1,
          "ACM_AUT.1": 2,
          "ACM_CAP": 1,
          "ACM_CAP.4": 2,
          "ACM_SCP": 1,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL": 1,
          "ADO_DEL.2": 2,
          "ADO_IGS": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP": 1,
          "ADV_FSP.2": 1,
          "ADV_HLD": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP": 1,
          "ADV_IMP.2": 3,
          "ADV_INT": 1,
          "ADV_LLD": 1,
          "ADV_LLD.1": 1,
          "ADV_RCR": 1,
          "ADV_RCR.1": 1,
          "ADV_SPM": 1,
          "ADV_SPM.1": 1
        },
        "AGD": {
          "AGD_ADM": 1,
          "AGD_ADM.1": 1,
          "AGD_USR": 1,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS": 1,
          "ALC_DVS.1": 4,
          "ALC_FLR": 2,
          "ALC_FLR.3": 2,
          "ALC_LCD.1": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_DES.1": 1,
          "ASE_ENV.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_PPC.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SRE.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_CCA.1": 2,
          "AVA_MSU": 1,
          "AVA_MSU.2": 1,
          "AVA_SOF": 1,
          "AVA_SOF.1": 1,
          "AVA_VLA": 1,
          "AVA_VLA.4": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1": 1,
          "EAL3": 1,
          "EAL4": 1,
          "EAL41": 1,
          "EAL5": 1,
          "EAL7": 2
        },
        "ITSEC": {
          "ITSEC E6 et": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 2,
          "FAU_GEN.2": 2,
          "FAU_STG.2": 2
        },
        "FCS": {
          "FCS_CKM.1": 2,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 2,
          "FCS_COP.1": 2,
          "FCS_RND.1": 3
        },
        "FDP": {
          "FDP_ACC.1": 2,
          "FDP_ACF.1": 2,
          "FDP_BKP.1": 3,
          "FDP_ETC.1": 2,
          "FDP_IFC.1": 2,
          "FDP_IFF.4": 2,
          "FDP_RIP.1": 2,
          "FDP_SDI.2": 2
        },
        "FIA": {
          "FIA_AFL.1": 2,
          "FIA_ATD.1": 2,
          "FIA_SOS.1": 2,
          "FIA_UAU.1": 2,
          "FIA_UID.1": 2
        },
        "FMT": {
          "FMT_MOF.1": 2,
          "FMT_MSA.1": 2,
          "FMT_MSA.2": 2,
          "FMT_MSA.3": 2,
          "FMT_MTD.1": 2,
          "FMT_SMF.1": 2,
          "FMT_SMR.1": 2
        },
        "FPT": {
          "FPT_AMT.1": 2,
          "FPT_FLS.1": 2,
          "FPT_ITC.1": 2,
          "FPT_ITI.1": 2,
          "FPT_PHP.2": 2,
          "FPT_PHP.3": 2,
          "FPT_RCV.1": 2,
          "FPT_STM.1": 2,
          "FPT_TRP.1": 1,
          "FPT_TST.1": 2
        },
        "FTP": {
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Serma": {
          "SERMA": 1,
          "Serma Technologies": 2
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 2
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "DPA": 2,
          "SPA": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        },
        "ISO": {
          "ISO/IEC 15408:1999": 1
        },
        "PKCS": {
          "PKCS#11": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "RC": {
            "RC4": 1
          }
        },
        "DES": {
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Patrick REDON",
      "/CreationDate": "D:20041126175603+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 5.0 pour Word",
      "/Keywords": "CER/F/07.3",
      "/ModDate": "D:20041126175737+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0 (Windows)",
      "/Subject": "BULL TrustWay PCI 2400 (PCA2 version 76675628-115A S302)",
      "/Title": "Rapport de certification 2004/34",
      "pdf_file_size_bytes": 907122,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 30
    },
    "st_filename": "cible2004_34.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA 512": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 12,
          "ACM_CAP.2": 1,
          "ACM_CAP.3": 4,
          "ACM_CAP.4": 23,
          "ACM_SCP.2": 8
        },
        "ADO": {
          "ADO_DEL.2": 13,
          "ADO_IGS.1": 10
        },
        "ADV": {
          "ADV_FSP.1": 17,
          "ADV_FSP.2": 17,
          "ADV_HLD.1": 4,
          "ADV_HLD.2": 18,
          "ADV_IMP.1": 5,
          "ADV_IMP.2": 17,
          "ADV_LLD.1": 18,
          "ADV_RCR.1": 10,
          "ADV_SPM.1": 13
        },
        "AGD": {
          "AGD_ADM.1": 21,
          "AGD_USR.1": 16
        },
        "ALC": {
          "ALC_DVS.1": 11,
          "ALC_FLR.3": 7,
          "ALC_FLR.3.1": 1,
          "ALC_FLR.3.2": 2,
          "ALC_FLR.3.3": 3,
          "ALC_FLR.3.4": 1,
          "ALC_FLR.3.6": 1,
          "ALC_FLR.3.7": 1,
          "ALC_LCD.1": 11,
          "ALC_TAT.1": 11
        },
        "ATE": {
          "ATE_COV.2": 9,
          "ATE_DPT.1": 7,
          "ATE_FUN.1": 15,
          "ATE_IND.2": 8
        },
        "AVA": {
          "AVA_CCA.1": 27,
          "AVA_MSU.2": 12,
          "AVA_SOF.1": 10,
          "AVA_VLA.4": 23
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 27,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 22,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 11,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 6,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG": 16,
          "FAU_STG.1": 2,
          "FAU_STG.2": 3
        },
        "FCS": {
          "FCS_CKM": 4,
          "FCS_CKM.1": 32,
          "FCS_CKM.2": 20,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 19,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 75,
          "FCS_COP.1": 28,
          "FCS_RND": 4,
          "FCS_RND.1": 12,
          "FCS_RND.1.1": 2,
          "FCS_RND.1.2": 2,
          "FCS_RNG.1": 1
        },
        "FDP": {
          "FDP_ACC": 62,
          "FDP_ACC.1": 5,
          "FDP_ACF": 50,
          "FDP_ACF.1": 20,
          "FDP_AFC": 3,
          "FDP_BKP": 4,
          "FDP_BKP.1": 30,
          "FDP_BKP.1.1": 2,
          "FDP_BKP.1.2": 2,
          "FDP_BKP.1.3": 2,
          "FDP_BKP.1.4": 3,
          "FDP_BKP.1.5": 2,
          "FDP_ETC.1": 8,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_IFC": 24,
          "FDP_IFC.1": 2,
          "FDP_IFF": 20,
          "FDP_IFF.1": 4,
          "FDP_IFF.4": 4,
          "FDP_ITC.1": 1,
          "FDP_RIP.1": 7,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.2": 7,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UIT.1": 6,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 10,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 7,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 7,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 5,
          "FIA_UAU.1": 13,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 7,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 17,
          "FMT_MSA": 25,
          "FMT_MSA.1": 3,
          "FMT_MSA.2": 14,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 17,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 50,
          "FMT_MTD.1": 5,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 18,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_AMT.1": 12,
          "FPT_AMT.1.1": 1,
          "FPT_FLS.1": 14,
          "FPT_FLS.1.1": 1,
          "FPT_ITC.1": 9,
          "FPT_ITC.1.1": 1,
          "FPT_ITI.1": 11,
          "FPT_ITI.1.1": 1,
          "FPT_ITI.1.2": 1,
          "FPT_PHP.2": 17,
          "FPT_PHP.2.1": 1,
          "FPT_PHP.2.2": 1,
          "FPT_PHP.2.3": 1,
          "FPT_PHP.3": 10,
          "FPT_PHP.3.1": 1,
          "FPT_RCV.1": 8,
          "FPT_RCV.1.1": 1,
          "FPT_STM.1": 13,
          "FPT_STM.1.1": 1,
          "FPT_TRP": 1,
          "FPT_TST.1": 21,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_TRP": 18,
          "FTP_TRP.1": 6
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "ECB": {
          "ECB": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 8
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 20
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 7,
          "malfunction": 4,
          "physical tampering": 18
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "Side-channel": 3,
          "Side-channels": 4,
          "side-channel": 4,
          "side-channels": 8,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 140": 1,
          "FIPS 140-2": 1,
          "FIPS 180-1": 1,
          "FIPS 46-3": 1,
          "FIPS PUB 140-2": 1,
          "FIPS PUB 186-2": 7,
          "FIPS140-1": 1,
          "FIPS140-2": 2,
          "FIPS180-1": 1,
          "FIPS46-3": 3
        },
        "PKCS": {
          "PKCS#1": 11,
          "PKCS#11": 7,
          "PKCS#8": 3
        },
        "RFC": {
          "RFC 1321": 1,
          "RFC 2104": 1,
          "RFC1321": 1,
          "RFC2104": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          },
          "RC": {
            "RC4": 18
          }
        },
        "DES": {
          "3DES": {
            "3DES": 7,
            "TDES": 18
          },
          "DES": {
            "DES": 12
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 19
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemplus": {
          "Gemplus": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "webssi",
      "/CreationDate": "D:20050104182856+01\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2",
      "/ModDate": "D:20050104182856+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 5.0 (Windows)",
      "/Title": "Microsoft Word - cible_2004_34.doc",
      "pdf_file_size_bytes": 548753,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 102
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2004_34.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VLA.4",
      "EAL4+",
      "ALC_FLR.3",
      "AVA_CCA.1",
      "ADV_IMP.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2004_34.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "60c1b9146641083400778a3b27f969e55fc11336393415045c17db42e9032a60",
      "txt_hash": "609b1486abfa62891488d32b01cf03cd0061b6b4c2b90664318ea9f979748dc8"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "874bb49a8563dc32051a640dc9928a79c078d4f753316b2991d6b72fb54dbdaa",
      "txt_hash": "8afe0dbdeb6a8f0fde20e181efb1ef51d66ed5d0435f9e2db132d635767ff7d5"
    }
  },
  "status": "archived"
}