Certificate

Extracted keywords

Security level
EAL5, EAL2
Claims
A.C, A.O
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP- 0072-2012-, BSI-CC-PP- 0076-2013-MA-01
Certificates
ANSSI-CC-2021/54
Evaluation facilities
CEA - LETI

File metadata

Creation date D:20211104110617+01'00'
Modification date D:20211104110617+01'00'
Pages 2
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 11.0 (Windows)

Certification report

Extracted keywords

Symmetric Algorithms
DES

CPLC
IC Type
Vendor
Infineon Technologies AG, Gemalto

Security level
EAL 5, EAL2, EAL7, ITSEC E6 Elevé
Claims
A.C, A.O
Security Assurance Requirements (SAR)
AGD_PRE_OPE, ALC_DVS.2, ALC_FLR, AVA_VAN.5, AVA_VAN
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-, BSI-CC-PP-0076-2013-MA-01, BSI-CC-PP-0059-, BSI-CC-PP-0075-, BSI-CC-PP-0071-, BSI-CC-PP-0072-, BSI-CC-PP-0076-, BSI-PP-0084-2014, PP-SSCD-Part2, PP-SSCD-Part3, PP-SSCD-Part4, PP-SSCD-Part5, PP-SSCD-Part6, PP-SSCD-
Certificates
BSI-DSZ-CC-1107-2020, ANSSI-CC-2021/54
Evaluation facilities
CESTI, CEA - LETI, CEA-LETI

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Creation date D:20211104110830+01'00'
Modification date D:20211104110830+01'00'
Pages 15
Creator PScript5.dll Version 5.2.2
Producer Acrobat Distiller 11.0 (Windows)

References

Outgoing
  • BSI-DSZ-CC-1107-2020 - archived - IFX_CCI_00002Dh, IFX_CCI_000039h, IFX_CCI_00003Ah, IFX_CCI_000044h, IFX_CCI_000045h, IFX_CCI_000046h, IFX_CCI_000047h, IFX_CCI_000048h, IFX_CCI_000049h, IFX_CCI_00004Ah, IFX_CCI_00004Bh, IFX_CCI_00004Ch, IFX_CCI_00004Dh, IFX_CCI_00004Eh design step T11 with firmware 80.306.16.0, optional NRG™ SW 05.03.4097, optional HSL v3.52.9708, UMSLC lib v01.30.0564, optional SCL v2.11.003, optional ACL v3.02.000 and user guidance

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, TDES
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman, DH
Schemes
MAC
Protocols
PACE
Randomness
RNG, RND

Vendor
Infineon, Gemalto, Thales

Security level
EAL6+, EAL 5+, EAL5, EAL5 augmented
Claims
O.SID, O.CIPHER, O.KEY-MNGT, O.REALLOCATION, O.GLOBAL_ARRAYS_INTEG, O.GLOBAL_ARRAYS_CONFID, O.ARRAY_VIEWS_CONFID, O.PIN-MNGT, O.OPERATE, O.ALARM, O.OBJ-DELETION, O.SCP, O.SECURE_LOAD_ACODE, O.SECURE_AC_ACTIVATION, O.CONFID-OS-UPDATE, O.FIREWALL, O.NATIVE, O.RNG, O.LOAD, O.INSTALL, O.DELETION, O.TRANSACTION, O.RESOURCES, O.TOE_IDENTIFICATION, A.C, A.O, A.CGA, A.SCA, A.CSP, A.CAP_FILE, A.VERIFICATION, OE.HI_VAD, OE.VERIFICATION, OE.CAP_FILE, OE.CODE-EVIDENCE, OE.CARD-MANAGEMENT, OE.HID_VAD, OE.SCP, OE.CODE-
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5
Security Functional Requirements (SFR)
FAU_ARP.1, FCO_NRO, FCS_CKM, FCS_CKM.4, FCS_COP, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM.2, FCS_CKM.3, FCS_RNG.1, FCS_RNG, FDP_DAU, FDP_UIT, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF, FDP_ACC.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_DAU.1, FDP_DAU.2.1, FDP_DAU.2.2, FDP_ITC, FDP_ITC.1.1, FDP_ITC.1.2, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.1, FDP_SDI.2, FDP_UCT, FDP_UCT.1, FDP_UIT.1, FDP_AFC, FDP_IFC.1, FDP_IFC, FDP_IFF, FDP_RIP, FIA_API, FIA_AFL, FIA_API.1, FIA_API.1.1, FIA_UAU.1, FIA_UID.1, FIA_AFL.1, FIA_UAU, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID, FIA_ATD, FIA_USB, FMT_MSA.3, FMT_MOF.1, FMT_SMR.1, FMT_SMF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.4, FMT_MTD, FMT_MTD.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMR, FMT_SMF, FMT_LIM, FPR_UNO.1, FPR_UNO, FPT_EMS, FPT_EMS.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_TST.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_FLS, FPT_RCV, FTP_ITC, FTP_ITC.1, FTP_TRP.1, FTP_ICT, FTP_TRP
Protection profiles
BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0075-2012-MA-01, BSI-CC-PP-0071-2012-MA-01, BSI-CC-PP-0072-2012-MA-01, BSI-CC-PP-0076-2013-MA-01, BSI-CC-PP-0099-V2-2020, PP-SSCD-KG, PP-SSCD-KI, PP-SSCD, PP-SSCD-
Certificates
CC-1, CC-2, CC-3

Side-channel analysis
SPA, DPA, timing attacks, physical tampering, DFA, fault induction, fault injection
Certification process
out of scope, data by authorized users. The functionalities of IAS Classic 5.2 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1 application) provides biometry recognition with

Standards
FIPS197, PKCS#3, PKCS#1, ICAO, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2012-04-003, CCMB-2017-04-004

File metadata

Title MultiApp V4.2: IAS EN Core & Extensions Security Target
Subject 1.1
Keywords 09-04-2019
Author D1491739
Creation date D:20211019114756+02'00'
Modification date D:20211019185225+02'00'
Pages 65
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

ANSSI-CC-2021/54

Extracted SARs

ALC_DVS.2, AVA_VAN.5

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021_54.pdf",
  "dgst": "c29a527d36110778",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "ANSSI-CC-2021/54",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "5.0",
        "5.2"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "27abdb9c6ab375a7",
        "d918b28fd7bb5d79",
        "d9553e7194783182",
        "1f7ea2e05de5b88b",
        "4a814d0e3c9f9082"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-2020"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1107-2020"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "THALES DIS FRANCE SA",
  "manufacturer_web": "https://www.thalesgroup.com/en/europe/france",
  "name": "IAS Classic v5.2 on MultiApp V5.0",
  "not_valid_after": "2026-11-04",
  "not_valid_before": "2021-11-04",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "certificat-anssi-cc-2021_54.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "FR": {
          "ANSSI-CC-2021/54": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.C": 1,
          "A.O": 1
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0072-2012-": 1,
          "BSI-CC-PP- 0076-2013-MA-01": 1,
          "BSI-CC-PP-0059-2009-MA-02": 1,
          "BSI-CC-PP-0075-2012-MA-01": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "",
      "/CreationDate": "D:20211104110617+01\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20211104110617+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 293970,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "anssi-cc-2021_54.pdf",
    "report_frontpage": {
      "FR": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1107-2020": 1
        },
        "FR": {
          "ANSSI-CC-2021/54": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.C": 4,
          "A.O": 4
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-": 1,
          "BSI-CC-PP-0059-2009-MA-02": 1,
          "BSI-CC-PP-0071-": 1,
          "BSI-CC-PP-0071-2012-MA-01": 1,
          "BSI-CC-PP-0072-": 1,
          "BSI-CC-PP-0072-2012-": 1,
          "BSI-CC-PP-0075-": 1,
          "BSI-CC-PP-0075-2012-MA-01": 1,
          "BSI-CC-PP-0076-": 1,
          "BSI-CC-PP-0076-2013-MA-01": 1,
          "BSI-PP-0084-2014": 1
        },
        "other": {
          "PP-SSCD-": 5,
          "PP-SSCD-Part2": 1,
          "PP-SSCD-Part3": 1,
          "PP-SSCD-Part4": 1,
          "PP-SSCD-Part5": 1,
          "PP-SSCD-Part6": 1
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_PRE_OPE": 2
        },
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL2": 2,
          "EAL7": 1
        },
        "ITSEC": {
          "ITSEC E6 Elev\u00e9": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {
        "ICType": {
          "IC Type": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "CEA-LETI": {
          "CEA - LETI": 1,
          "CEA-LETI": 2
        },
        "CESTI": {
          "CESTI": 2
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 1
        },
        "Infineon": {
          "Infineon Technologies AG": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "",
      "/CreationDate": "D:20211104110830+01\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20211104110830+01\u002700\u0027",
      "/Producer": "Acrobat Distiller 11.0 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 171587,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "anssi-cible-cc-2021_54en.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 1
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "DH": 2,
            "Diffie-Hellman": 2
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "CC-1": 2,
          "CC-2": 3,
          "CC-3": 3
        }
      },
      "cc_claims": {
        "A": {
          "A.C": 5,
          "A.CAP_FILE": 3,
          "A.CGA": 2,
          "A.CSP": 2,
          "A.O": 5,
          "A.SCA": 2,
          "A.VERIFICATION": 3
        },
        "O": {
          "O.ALARM": 1,
          "O.ARRAY_VIEWS_CONFID": 1,
          "O.CIPHER": 1,
          "O.CONFID-OS-UPDATE": 2,
          "O.DELETION": 1,
          "O.FIREWALL": 1,
          "O.GLOBAL_ARRAYS_CONFID": 1,
          "O.GLOBAL_ARRAYS_INTEG": 1,
          "O.INSTALL": 1,
          "O.KEY-MNGT": 1,
          "O.LOAD": 1,
          "O.NATIVE": 1,
          "O.OBJ-DELETION": 1,
          "O.OPERATE": 1,
          "O.PIN-MNGT": 1,
          "O.REALLOCATION": 1,
          "O.RESOURCES": 1,
          "O.RNG": 1,
          "O.SCP": 3,
          "O.SECURE_AC_ACTIVATION": 2,
          "O.SECURE_LOAD_ACODE": 2,
          "O.SID": 1,
          "O.TOE_IDENTIFICATION": 1,
          "O.TRANSACTION": 1
        },
        "OE": {
          "OE.CAP_FILE": 4,
          "OE.CARD-MANAGEMENT": 2,
          "OE.CODE-": 1,
          "OE.CODE-EVIDENCE": 3,
          "OE.HID_VAD": 1,
          "OE.HI_VAD": 2,
          "OE.SCP": 2,
          "OE.VERIFICATION": 7
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0059-2009-MA-02": 1,
          "BSI-CC-PP-0071-2012-MA-01": 1,
          "BSI-CC-PP-0072-2012-MA-01": 1,
          "BSI-CC-PP-0075-2012-MA-01": 1,
          "BSI-CC-PP-0076-2013-MA-01": 1,
          "BSI-CC-PP-0099-V2-2020": 1
        },
        "other": {
          "PP-SSCD": 4,
          "PP-SSCD-": 1,
          "PP-SSCD-KG": 35,
          "PP-SSCD-KI": 27
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 3
        },
        "AVA": {
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5+": 1,
          "EAL5": 3,
          "EAL5 augmented": 1,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 1
        },
        "FCO": {
          "FCO_NRO": 1
        },
        "FCS": {
          "FCS_CKM": 46,
          "FCS_CKM.1": 14,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 1,
          "FCS_CKM.3": 1,
          "FCS_CKM.4": 13,
          "FCS_CKM.4.1": 2,
          "FCS_COP": 28,
          "FCS_COP.1": 7,
          "FCS_COP.1.1": 2,
          "FCS_RNG": 1,
          "FCS_RNG.1": 2
        },
        "FDP": {
          "FDP_ACC": 47,
          "FDP_ACC.1": 26,
          "FDP_ACC.1.1": 4,
          "FDP_ACF": 34,
          "FDP_ACF.1": 9,
          "FDP_ACF.1.1": 4,
          "FDP_ACF.1.2": 4,
          "FDP_ACF.1.3": 4,
          "FDP_ACF.1.4": 4,
          "FDP_AFC": 1,
          "FDP_DAU": 8,
          "FDP_DAU.1": 1,
          "FDP_DAU.2.1": 1,
          "FDP_DAU.2.2": 1,
          "FDP_IFC": 2,
          "FDP_IFC.1": 9,
          "FDP_IFF": 2,
          "FDP_ITC": 8,
          "FDP_ITC.1": 9,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.2": 8,
          "FDP_RIP": 6,
          "FDP_RIP.1": 14,
          "FDP_RIP.1.1": 1,
          "FDP_SDI": 16,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 4,
          "FDP_UCT": 8,
          "FDP_UCT.1": 1,
          "FDP_UIT": 7,
          "FDP_UIT.1": 2
        },
        "FIA": {
          "FIA_AFL": 14,
          "FIA_AFL.1": 4,
          "FIA_API": 5,
          "FIA_API.1": 11,
          "FIA_API.1.1": 2,
          "FIA_ATD": 2,
          "FIA_UAU": 21,
          "FIA_UAU.1": 9,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UID": 19,
          "FIA_UID.1": 14,
          "FIA_USB": 1
        },
        "FMT": {
          "FMT_LIM": 2,
          "FMT_MOF.1": 6,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 62,
          "FMT_MSA.1": 9,
          "FMT_MSA.2": 6,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 15,
          "FMT_MSA.4": 4,
          "FMT_MTD": 21,
          "FMT_MTD.1": 2,
          "FMT_SMF": 6,
          "FMT_SMF.1": 23,
          "FMT_SMF.1.1": 1,
          "FMT_SMR": 7,
          "FMT_SMR.1": 33,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO": 1,
          "FPR_UNO.1": 1
        },
        "FPT": {
          "FPT_EMS": 5,
          "FPT_EMS.1": 11,
          "FPT_EMS.1.1": 4,
          "FPT_EMS.1.2": 3,
          "FPT_FLS": 6,
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_PHP.1": 5,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 8,
          "FPT_PHP.3.1": 1,
          "FPT_RCV": 2,
          "FPT_TST": 2,
          "FPT_TST.1": 11,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ICT": 2,
          "FTP_ITC": 28,
          "FTP_ITC.1": 16,
          "FTP_TRP": 1,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {
        "OutOfScope": {
          "data by authorized users. The functionalities of IAS Classic 5.2 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1 application) provides biometry recognition with": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 11
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 1,
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "fault induction": 1,
          "fault injection": 1,
          "physical tampering": 4
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-04-003": 1,
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS197": 2
        },
        "ICAO": {
          "ICAO": 2
        },
        "PKCS": {
          "PKCS#1": 2,
          "PKCS#3": 3
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "DES": {
          "3DES": {
            "TDES": 4
          },
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Gemalto": {
          "Gemalto": 3
        },
        "Infineon": {
          "Infineon": 8
        },
        "Thales": {
          "Thales": 7
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "D1491739",
      "/CreationDate": "D:20211019114756+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "09-04-2019",
      "/ModDate": "D:20211019185225+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "1.1",
      "/Title": "MultiApp V4.2: IAS EN Core \u0026 Extensions Security Target",
      "pdf_file_size_bytes": 2133951,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 65
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_54.pdf",
  "scheme": "FR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "EAL5+",
      "AVA_VAN.5"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_54en.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c161e265f56f88ccc0e8f2236821ae81a2787b35e9886f27423c1e9762bb0bd9",
      "txt_hash": "d508e8b38517f0745a02842d16cbbebd1728f3917f26c98745cf97bfc0711673"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "17c30579ac2a4eb0649126188f6f4370594f752744dd364a1db4bd49fc54428d",
      "txt_hash": "dc2341a57f028ae3aa6afba44b13caa8e805274714664db10e36d8283d6626e4"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4a82b8a625ffa1ef05c49bf20bed8117488daef74386eca69837b275ef3b6285",
      "txt_hash": "ae42541b69d69e3abc149408deeeda4256939e303d68092c82835c1d831b3252"
    }
  },
  "status": "active"
}