This page was not yet optimized for use on mobile
devices.
TrustWay Proteccio (V167/X170) (ANSSI-CC-2024/13)
CSV information
| Status | active |
|---|---|
| Valid from | 02.07.2024 |
| Valid until | 02.07.2029 |
| Scheme | 🇫🇷 FR |
| Manufacturer | BULL S.A. |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ADV_IMP.2, AVA_VAN.5, EAL4+, ALC_CMC.5, ALC_FLR.3 |
Heuristics summary
Certificate ID: ANSSI-CC-2024/13
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL4, EAL2Security Assurance Requirements (SAR)
ADV_IMP.2, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, AVA_VAN.5Certificates
ANSSI-CC-2024/13Evaluation facilities
SERMA, AMOSSYSCertification report
Extracted keywords
Symmetric Algorithms
DESSecurity level
EAL4, EAL2, EAL7, ITSEC E6 ElevéSecurity Assurance Requirements (SAR)
ADV_IMP.2, ALC_CMC.5, ALC_DVS.2, ALC_FLR.3, ALC_FLR, AVA_VAN.5Certificates
ANSSI-CC-2024/13Evaluation facilities
SERMA, CESTI, AMOSSYSStandards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Creation date | D:20240704154212+02'00' |
|---|---|
| Modification date | D:20240704154628+02'00' |
| Pages | 13 |
| Creator | Acrobat PDFMaker 23 pour Word |
| Producer | Adobe PDF Library 23.1.175 |
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, 3DES, TDES, HMAC, CMACAsymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECIES, ECC, DHHash functions
SHA-1, SHA256, SHA384, SHA512, SHA-256, SHA-384, SHA-512, SHA-2, MD5Schemes
MAC, Key ExchangeProtocols
TLS v1.2, TLS, IKEv2Libraries
OpenSSLElliptic Curves
secp521r1Block cipher modes
ECB, CBC, GCMVendor
IDEMIASecurity level
EAL4, EAL5+, EAL 4, EAL4 augmented, EAL 4 augmentedClaims
O.KEYS_SECURE, O.CRYPTO_SECURE, O.SECURE_LOADING, O.TRUSTED_PATH, O.DEPERSONALIZATION, O.AUDIT, O.CHECK_OPERATION, O.RBAC, O.ATTACK_RESPONSE, O.SECURE_STATE, O.PROTECT_EXPORTED_DATA, O.USER_AUTHENTICATION, O.BACKUP_SECURE, O.BACKUP_KEY_SECURE, O.ENV_ADMIN, O.ENV_SECURE_CHANNEL, O.ENV_PROTECTION_HOST, O.ENV_APPLICATION, O.ENV_AUDIT, O.ENV_PERSONNEL, O.ENV_PROTECT_ACCESS, O.ENV_RECOVERY, O.ENV_SECURE_INIT, O.ENV_SECURE_OPER, T.INSECURE_CHANNEL, T.TRUSTED_PATH, T.KEYS_DERIVE, T.CSP_SCD_DERIVE, T.KEYS_DISCLOSE, T.CSP_SCD_DISCLOSE, T.KEYS_ALTERATION, T.CSP_SCD_ALTERATION, T.MISUSE_OPERATION, T.CRYPTO_FORGERY, T.SIGNATURE_FORGERY, T.BACKUP, T.BAD_SW, T.CSP_SVD_ALTERATION, T.DATA_MANIPUL, T.INSECURE_INIT, T.MALFUNCTION, T.MISUSE_OF_TOE, T.PHYS_MANIPUL, T.BACKUP_RESTORE, A.PROTECTION_HOST, A.SECURE_CHANNEL, A.AUDIT_SUPPORT, A.DATA_STORE, A.CRYPTOUSER_AGENT, A.TRUSTED_ENVIRONMENT, A.CORRECT_DTBS, A.ADMIN, R.SERVICES, R.USER_PUB_KEYS, R.DTBSR_DS, R.DTBS_REPRESENTATION, R.TSF_DATA, R.USERMGMT_DATA, R.CODE_HSM, R.BACKUP_DATA, R.USER_DATA, R.BACKUP_KEY, R.DTBS, R.BACKUP_KEYS, R.SCP-SCDSecurity Assurance Requirements (SAR)
ADV_IMP.2, ADV_ARC.1, ADV_FSP.4, ADV_TDS.3, ADV_TDS.1, ADV_FSP.1, ADV_IMP.1, ADV_FSP.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.3, ALC_CMC.5, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_CMS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_DPT.2, ATE_COV.1, AVA_VAN.5Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_STG.2, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FAU_STG, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_RND.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1, FCS_COP.1.1, FCS_RND.1.1, FCS_RND.1.2, FCS_CKM, FCS_COP, FDP_BKP.1, FDP_BKP.1.4, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_BKP.1.1, FDP_BKP.1.2, FDP_BKP.1.3, FDP_BKP.1.5, FDP_ETC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACC, FDP_ACF, FDP_UNO.1, FDP_ITC.1, FDP_ITC.2, FDP_IFC, FDP_IFC.1, FIA_AFL.1, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UID.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MSA.1, FMT_MSA.3, FMT_MTD, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_MSA, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO, FPT_FLS.1, FPT_ITI.1, FPT_PHP.2, FPT_TST.1, FPT_PHP.3, FPT_FLS.1.1, FPT_ITC.1, FPT_ITC.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_ITT.1, FPT_ITT.1.1, FPT_PHP.2.1, FPT_PHP.2.2, FPT_PHP.2.3, FPT_PHP.3.1, FPT_RCV.1, FPT_RCV.1.1, FPT_STM.1, FPT_STM.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ITI, FTP_TRP.1, FTP_TRP.1.1, FTP_TRP.1.2, FTP_TRP.1.3, FTP_TRPCertificates
ANSSI-CC-2019/04Side-channel analysis
side-channel, side-channels, SPA, DPA, timing attacks, physical tampering, malfunction, MalfunctionStandards
FIPS 46-3, FIPS 180-4, FIPS PUB 186-4, FIPS 140-3, FIPS140-2, FIPS PUB 46-3, FIPS PUB 197, FIPS 140-2, FIPS PUB 186-43, FIPS PUB 113, FIPS PUB 198, FIPS PUB 180-2, PKCS#1, PKCS#8, PKCS#11, PKCS #11, PKCS #1, RFC 2104, RFC8017, RFC5208, RFC 5996, RFC 1321, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Creation date | D:20240729114009+02'00' |
|---|---|
| Modification date | D:20240729114009+02'00' |
| Pages | 99 |
| Creator | Microsoft® Word 2019 |
| Producer | Microsoft® Word 2019 |
References
Outgoing- ANSSI-CC-2019/04 - archived - IDeal Citiz v2.17-i on Infineon M7893 B11 Java Card Open Platform
- OCSI/CERT/CCL/09/2024/RC - active - Trident version 3.2.3
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
ANSSI-CC-2024/13Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| Trustway IP Protect (Version 6.01.17) (ANSSI-CC-2024/32) | ANSSI-CC-2024/32 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2024_13fr.pdf",
"dgst": "b85f4ae5c84cc302",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "ANSSI-CC-2024/13",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"13",
"2024"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"OCSI/CERT/CCL/09/2024/RC"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"ANSSI-CC-2019/04"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"OCSI/CERT/CCL/09/2024/RC"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0879-V3-2018",
"ANSSI-CC-2019/04"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "BULL S.A.",
"manufacturer_web": "https://www.bull.com",
"name": "TrustWay Proteccio (V167/X170) (ANSSI-CC-2024/13)",
"not_valid_after": "2029-07-02",
"not_valid_before": "2024-07-02",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "Certificat-CC-2024_13fr.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2024/13": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_IMP.2": 1
},
"ALC": {
"ALC_CMC.5": 1,
"ALC_DVS.2": 1,
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"AMOSSYS": {
"AMOSSYS": 2
},
"Serma": {
"SERMA": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "ANSSI-CC-2024_13fr.pdf",
"report_frontpage": {
"FR": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2024/13": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_IMP.2": 1
},
"ALC": {
"ALC_CMC.5": 1,
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.3": 2
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2,
"EAL4": 1,
"EAL7": 1
},
"ITSEC": {
"ITSEC E6 Elev\u00e9": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"AMOSSYS": {
"AMOSSYS": 3
},
"CESTI": {
"CESTI": 2
},
"Serma": {
"SERMA": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20240704154212+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 23 pour Word",
"/Keywords": "",
"/ModDate": "D:20240704154628+02\u002700\u0027",
"/Producer": "Adobe PDF Library 23.1.175",
"pdf_file_size_bytes": 370615,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ssi.gouv.fr/",
"http://www.commoncriteriaportal.org/",
"mailto:[email protected]",
"http://www.sogis.eu/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 13
},
"st_filename": "ANSSI-cible-CC-2024_13Enn.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 9
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 7
},
"ECIES": {
"ECIES": 1
}
},
"FF": {
"DH": {
"DH": 1
}
},
"RSA": {
"RSA 1024": 2
}
},
"cc_cert_id": {
"FR": {
"ANSSI-CC-2019/04": 1
}
},
"cc_claims": {
"A": {
"A.ADMIN": 5,
"A.AUDIT_SUPPORT": 6,
"A.CORRECT_DTBS": 5,
"A.CRYPTOUSER_AGENT": 4,
"A.DATA_STORE": 6,
"A.PROTECTION_HOST": 6,
"A.SECURE_CHANNEL": 1,
"A.TRUSTED_ENVIRONMENT": 5
},
"O": {
"O.ATTACK_RESPONSE": 9,
"O.AUDIT": 20,
"O.BACKUP_KEY_SECURE": 7,
"O.BACKUP_SECURE": 8,
"O.CHECK_OPERATION": 21,
"O.CRYPTO_SECURE": 18,
"O.DEPERSONALIZATION": 10,
"O.ENV_ADMIN": 6,
"O.ENV_APPLICATION": 21,
"O.ENV_AUDIT": 19,
"O.ENV_PERSONNEL": 18,
"O.ENV_PROTECTION_HOST": 6,
"O.ENV_PROTECT_ACCESS": 14,
"O.ENV_RECOVERY": 9,
"O.ENV_SECURE_CHANNEL": 12,
"O.ENV_SECURE_INIT": 11,
"O.ENV_SECURE_OPER": 13,
"O.KEYS_SECURE": 15,
"O.PROTECT_EXPORTED_DATA": 14,
"O.RBAC": 16,
"O.SECURE_LOADING": 8,
"O.SECURE_STATE": 19,
"O.TRUSTED_PATH": 9,
"O.USER_AUTHENTICATION": 21
},
"R": {
"R.BACKUP_DATA": 10,
"R.BACKUP_KEY": 32,
"R.BACKUP_KEYS": 1,
"R.CODE_HSM": 3,
"R.DTBS": 2,
"R.DTBSR_DS": 1,
"R.DTBS_REPRESENTATION": 6,
"R.SCP-SCD": 2,
"R.SERVICES": 13,
"R.TSF_DATA": 14,
"R.USERMGMT_DATA": 13,
"R.USER_DATA": 92,
"R.USER_PUB_KEYS": 19
},
"T": {
"T.BACKUP": 20,
"T.BACKUP_RESTORE": 1,
"T.BAD_SW": 20,
"T.CRYPTO_FORGERY": 7,
"T.CSP_SCD_ALTERATION": 1,
"T.CSP_SCD_DERIVE": 1,
"T.CSP_SCD_DISCLOSE": 1,
"T.CSP_SVD_ALTERATION": 5,
"T.DATA_MANIPUL": 5,
"T.INSECURE_CHANNEL": 7,
"T.INSECURE_INIT": 17,
"T.KEYS_ALTERATION": 17,
"T.KEYS_DERIVE": 9,
"T.KEYS_DISCLOSE": 12,
"T.MALFUNCTION": 13,
"T.MISUSE_OF_TOE": 13,
"T.MISUSE_OPERATION": 15,
"T.PHYS_MANIPUL": 13,
"T.SIGNATURE_FORGERY": 1,
"T.TRUSTED_PATH": 9
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 4,
"ADV_FSP.1": 5,
"ADV_FSP.2": 2,
"ADV_FSP.4": 4,
"ADV_IMP.1": 4,
"ADV_IMP.2": 8,
"ADV_TDS.1": 4,
"ADV_TDS.3": 5
},
"AGD": {
"AGD_OPE.1": 5,
"AGD_PRE.1": 4
},
"ALC": {
"ALC_CMC.5": 7,
"ALC_CMS.1": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 2,
"ALC_DVS.2": 9,
"ALC_FLR.3": 7,
"ALC_LCD.1": 3,
"ALC_TAT.1": 3
},
"ATE": {
"ATE_COV.1": 4,
"ATE_COV.2": 3,
"ATE_DPT.1": 2,
"ATE_DPT.2": 1,
"ATE_FUN.1": 4,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 9
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 5,
"EAL4 augmented": 2,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 17,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 12,
"FAU_GEN.2.1": 1,
"FAU_STG": 6,
"FAU_STG.2": 1,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1
},
"FCS": {
"FCS_CKM": 20,
"FCS_CKM.1": 26,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 10,
"FCS_CKM.2.1": 2,
"FCS_CKM.4": 21,
"FCS_CKM.4.1": 1,
"FCS_COP": 52,
"FCS_COP.1": 23,
"FCS_COP.1.1": 12,
"FCS_RND.1": 8,
"FCS_RND.1.1": 1,
"FCS_RND.1.2": 1
},
"FDP": {
"FDP_ACC": 60,
"FDP_ACC.1": 9,
"FDP_ACC.1.1": 6,
"FDP_ACF": 49,
"FDP_ACF.1": 9,
"FDP_ACF.1.1": 6,
"FDP_ACF.1.2": 6,
"FDP_ACF.1.3": 6,
"FDP_ACF.1.4": 6,
"FDP_BKP.1": 20,
"FDP_BKP.1.1": 1,
"FDP_BKP.1.2": 1,
"FDP_BKP.1.3": 1,
"FDP_BKP.1.4": 2,
"FDP_BKP.1.5": 1,
"FDP_ETC.1": 6,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC": 2,
"FDP_IFC.1": 3,
"FDP_ITC.1": 7,
"FDP_ITC.2": 6,
"FDP_RIP.1": 9,
"FDP_RIP.1.1": 1,
"FDP_SDI.2": 7,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UNO.1": 1
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 5,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 8,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UID.1": 11,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 11,
"FMT_MOF.1.1": 1,
"FMT_MSA": 18,
"FMT_MSA.1": 3,
"FMT_MSA.1.1": 2,
"FMT_MSA.2": 6,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 14,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 39,
"FMT_MTD.1": 5,
"FMT_MTD.1.1": 5,
"FMT_SMF.1": 16,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 16,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO": 3,
"FPR_UNO.1": 9
},
"FPT": {
"FPT_FLS.1": 11,
"FPT_FLS.1.1": 1,
"FPT_ITC.1": 5,
"FPT_ITC.1.1": 1,
"FPT_ITI": 1,
"FPT_ITI.1": 9,
"FPT_ITI.1.1": 1,
"FPT_ITI.1.2": 1,
"FPT_ITT.1": 7,
"FPT_ITT.1.1": 1,
"FPT_PHP.2": 13,
"FPT_PHP.2.1": 1,
"FPT_PHP.2.2": 1,
"FPT_PHP.2.3": 1,
"FPT_PHP.3": 8,
"FPT_PHP.3.1": 1,
"FPT_RCV.1": 6,
"FPT_RCV.1.1": 1,
"FPT_STM.1": 9,
"FPT_STM.1.1": 1,
"FPT_TST.1": 17,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_TRP": 7,
"FTP_TRP.1": 2,
"FTP_TRP.1.1": 1,
"FTP_TRP.1.2": 1,
"FTP_TRP.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 7
},
"ECB": {
"ECB": 5
},
"GCM": {
"GCM": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"OpenSSL": {
"OpenSSL": 1
}
},
"crypto_protocol": {
"IKE": {
"IKEv2": 1
},
"TLS": {
"TLS": {
"TLS": 3,
"TLS v1.2": 1
}
}
},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 11
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"secp521r1": 3
}
},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 10
}
},
"SHA": {
"SHA1": {
"SHA-1": 9
},
"SHA2": {
"SHA-2": 1,
"SHA-256": 3,
"SHA-384": 3,
"SHA-512": 3,
"SHA256": 6,
"SHA384": 7,
"SHA512": 5
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 1,
"malfunction": 4,
"physical tampering": 15
},
"SCA": {
"DPA": 2,
"SPA": 2,
"side-channel": 3,
"side-channels": 2,
"timing attacks": 2
}
},
"standard_id": {
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1
},
"FIPS": {
"FIPS 140-2": 3,
"FIPS 140-3": 1,
"FIPS 180-4": 1,
"FIPS 46-3": 1,
"FIPS PUB 113": 3,
"FIPS PUB 180-2": 4,
"FIPS PUB 186-4": 7,
"FIPS PUB 186-43": 1,
"FIPS PUB 197": 7,
"FIPS PUB 198": 3,
"FIPS PUB 46-3": 8,
"FIPS140-2": 1
},
"PKCS": {
"PKCS #1": 4,
"PKCS #11": 2,
"PKCS#1": 5,
"PKCS#11": 16,
"PKCS#8": 2
},
"RFC": {
"RFC 1321": 1,
"RFC 2104": 1,
"RFC 5996": 1,
"RFC5208": 1,
"RFC8017": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 24
}
},
"DES": {
"3DES": {
"3DES": 2,
"TDES": 3
},
"DES": {
"DES": 14
}
},
"constructions": {
"MAC": {
"CMAC": 1,
"HMAC": 18
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Idemia": {
"IDEMIA": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20240729114009+02\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2019",
"/ModDate": "D:20240729114009+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2019",
"pdf_file_size_bytes": 1247089,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 99
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_13fr.pdf",
"scheme": "FR",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.3",
"EAL4+",
"AVA_VAN.5",
"ALC_CMC.5",
"ADV_IMP.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2024_13Enn.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "3e0122ac94732ad5bd693e0bdafc378e0e550ba9aa9b78f1f08bfefbc38db771",
"txt_hash": "555dba11224f205329b13bc97f9117cc54c4ee904a54ab612218322cd3d11755"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "821268345e4c392e06d62f8af82a66a362e34f84611758ec5e75508b2a81b047",
"txt_hash": "a47d3c5ea135826b74c7bb4aba601cc8218a9983ab19e6ec88f480023a04e2ea"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "b43b2f706a124a28a0b6415d5a1deb138d1240c3eaf45621b12f8efec0ce1db4",
"txt_hash": "a86c6d1d4c634fb4c36bee1bd843980d439b3a34220482aba83db60628913742"
}
},
"status": "active"
}