Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Huawei HSM 2.0 Management Firmware version B006
NSCIB-CC-2200028-01-CR
Plateforme Java Card MultiApp V5.0 version 5.0
ANSSI-CC-2021/42
name Huawei HSM 2.0 Management Firmware version B006 Plateforme Java Card MultiApp V5.0 version 5.0
scheme NL FR
not_valid_after 18.11.2028 14.10.2026
not_valid_before 18.11.2023 14.10.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200028-01-Cert.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021_42.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200028-01-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_42.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2200028-01-STv2.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_42en.pdf
manufacturer Huawei Technologies Co. Ltd. THALES DIS FRANCE SA
manufacturer_web https://www.huawei.com https://www.thalesgroup.com/en/europe/france
security_level EAL4+, ALC_DVS.2, AVA_VAN.5 ALC_FLR.1, EAL6+
dgst 226e9a832dcdfd33 58725b1e960799a8
heuristics/cert_id NSCIB-CC-2200028-01-CR ANSSI-CC-2021/42
heuristics/cert_lab []
heuristics/extracted_sars AVA_VAN.5, ADV_ARC.1, AGD_PRE.1, ALC_DVS.2, ADV_IMP.1, ADV_FSP.4, ADV_TDS.3, AGD_OPE.1 ADV_ARC.1, ATE_COV.3, ALC_DVS.2, ASE_OBJ.2, ALC_FLR.1, ASE_SPD.1, ATE_IND.2, ADV_TDS.5, AGD_PRE.1, ADV_FSP.5, ALC_DEL.1, ATE_DPT.3, ALC_TAT.3, ADV_IMP.2, ASE_ECD.1, ASE_REQ.2, ALC_LCD.1, ASE_TSS.1, ASE_INT.1, AVA_VAN.5, ALC_CMS.5, ALC_CMC.5, ASE_CCL.1, ADV_INT.3, ATE_FUN.2, ADV_SPM.1, AGD_OPE.1
heuristics/extracted_versions 2.0 5.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2022/10, ANSSI-CC-2022/37, ANSSI-CC-2022/23, ANSSI-CC-2022/53
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2022/55, ANSSI-CC-2022/11, ANSSI-CC-2022/57, ANSSI-CC-2022/13, ANSSI-CC-2022/53, ANSSI-CC-2022/10, ANSSI-CC-2022/54, ANSSI-CC-2022/52, ANSSI-CC-2022/56, ANSSI-CC-2022/22, ANSSI-CC-2022/12, ANSSI-CC-2022/37, ANSSI-CC-2022/23
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/scheme_data
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2022/53
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2022/53
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/protection_profiles {} 94167fd161e87d71
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf
pdf_data/cert_filename NSCIB-CC-2200028-01-Cert.pdf certificat-anssi-cc-2021_42.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • NSCIB-2200028-01: 1
    • NSCIB-CC-2200028-01: 1
  • FR:
    • ANSSI-CC-2021/42: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-099-V2-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL4: 2
    • EAL4 augmented: 1
  • EAL:
    • EAL2: 1
    • EAL6: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.C: 1
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 1
    • Huawei Technologies Co: 2
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
  • CEA-LETI:
    • CEA-LETI: 2
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 18045:2008: 1
pdf_data/cert_metadata
  • /Author: Wim Ton
  • /CreationDate: D:20231204152855+00'00'
  • /Creator: Microsoft® Word 2021
  • /ModDate: D:20231204152855+00'00'
  • /Producer: Microsoft® Word 2021
  • /Title: NSCIB Certificate
  • pdf_file_size_bytes: 69183
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate: D:20211018162825+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211018162825+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 293555
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename NSCIB-CC-2200028-01-CR.pdf anssi-cc-2021_42.pdf
pdf_data/report_frontpage
  • FR:
  • NL:
    • cert_id: NSCIB-CC-2200028-01-CR
    • cert_item: Huawei HSM 2.0 Management Firmware version B006
    • cert_lab: SGS Brightsight B.V.
    • developer: Huawei Technologies Co., Ltd
  • FR:
  • NL:
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-2200028-01: 1
    • NSCIB-CC-2200028-01-CR: 11
  • DE:
    • BSI-DSZ-CC-1107-2020: 1
  • FR:
    • ANSSI-CC-2021/42: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 2
  • EAL:
    • EAL 6: 1
    • EAL2: 2
    • EAL6+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
  • AGD:
    • AGD_ALP: 1
    • AGD_OPE: 4
    • AGD_PRE: 2
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/cc_claims
  • R:
    • R.C: 3
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 24
    • Huawei Technologies Co: 4
  • Gemalto:
    • Gemalto: 5
  • Infineon:
    • Infineon Technologies AG: 2
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
  • SGS:
    • SGS: 2
    • SGS Brightsight: 2
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • CCM:
    • CCM: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • malfunction: 1
  • SCA:
    • Side-channel: 1
  • other:
    • JIL: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 3
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 3
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • or replaced. Log&Dfx collects logs and device health status information. The “crypto services” are out of scope for this certification. 2.5 Documentation The following documentation is provided with the product: 1
    • out of scope: 2
    • remote attestation, secure update, and key management. The actual cryptographic operations are out of scope as these are provided by the underlying hardware. Although the smartcard rating methodology was: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20211018162639+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211018162639+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 195709
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename NSCIB-CC-2200028-01-STv2.0.pdf anssi-cible-cc-2021_42en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-2020: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0099-V2-2020: 1
    • BSI-PP- 0055-2009: 1
    • BSI-PP-0056-V2-MA-2012: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 7
    • EAL4+: 4
  • EAL:
    • EAL 6+: 1
    • EAL6: 31
    • EAL6 augmented: 1
    • EAL6+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.2: 6
  • AVA:
    • AVA_VAN.5: 6
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 8
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 5
    • ADV_IMP: 1
    • ADV_IMP.1: 6
    • ADV_IMP.2: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 8
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 7
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 7
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 4
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 6
    • ATE_FUN.2: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.1.1: 2
    • FAU_SAG: 3
    • FAU_SAG.1: 11
    • FAU_SAG.1.1: 2
    • FAU_SAG.1.2: 2
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP: 8
    • FCS_COP.1: 3
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 14
    • FDP_ACF: 20
    • FDP_ACF.1: 20
    • FDP_ETC: 10
    • FDP_ETC.1: 4
    • FDP_IFC: 15
    • FDP_IFC.1: 12
    • FDP_IFF: 15
    • FDP_IFF.1: 18
    • FDP_IFF.1.3: 1
    • FDP_ITC: 10
    • FDP_ITC.1: 8
    • FDP_ITC.2: 2
    • FDP_MSA: 1
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 2
  • FIA:
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA: 39
    • FMT_MSA.1: 11
    • FMT_MSA.3: 21
    • FMT_SMF: 5
    • FMT_SMF.1: 2
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 1
    • FPT_RCV.2: 5
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_RCV.4: 5
    • FPT_RCV.4.1: 1
    • FPT_STM.1: 2
    • FPT_TEE: 16
    • FPT_TEE.1: 6
  • FAU:
    • FAU_ARP.1: 15
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
    • FAU_SAS.1: 2
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 62
    • FCS_CKM.1: 29
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 5
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 28
    • FCS_CKM.4.1: 2
    • FCS_CMK.4: 2
    • FCS_COP: 66
    • FCS_COP.1: 31
    • FCS_COP.1.1: 5
    • FCS_RNG: 25
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 44
    • FDP_ACC.1: 20
    • FDP_ACC.2: 6
    • FDP_ACF: 39
    • FDP_ACF.1: 25
    • FDP_IFC: 24
    • FDP_IFC.1: 14
    • FDP_IFC.2: 2
    • FDP_IFF: 16
    • FDP_IFF.1: 14
    • FDP_ITC: 11
    • FDP_ITC.1: 12
    • FDP_ITC.2: 17
    • FDP_ITT.1: 2
    • FDP_RIP: 97
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_ROL: 13
    • FDP_ROL.1: 5
    • FDP_SDC.1: 2
    • FDP_SDI: 8
    • FDP_SDI.2: 4
    • FDP_UCT.1: 2
    • FDP_UIT: 6
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 21
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 1
    • FIA_API.1: 2
    • FIA_ATD: 12
    • FIA_ATD.1: 3
    • FIA_UAU: 64
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 42
    • FIA_UID.1: 18
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 34
    • FMT_LIM.1: 17
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 16
    • FMT_LIM.2.1: 3
    • FMT_MSA: 96
    • FMT_MSA.1: 13
    • FMT_MSA.2: 2
    • FMT_MSA.3: 21
    • FMT_MTD: 57
    • FMT_MTD.1: 13
    • FMT_MTD.3: 1
    • FMT_SMF: 78
    • FMT_SMF.1: 29
    • FMT_SMF.1.1: 2
    • FMT_SMR: 88
    • FMT_SMR.1: 38
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 47
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 2
    • FPT_ITT: 6
    • FPT_ITT.1: 2
    • FPT_PHP: 7
    • FPT_PHP.3: 17
    • FPT_PHP.3.1: 1
    • FPT_RCV: 12
    • FPT_RCV.3: 4
    • FPT_RCV.4: 2
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 8
    • FPT_TST.1: 15
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC: 17
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 4
    • FTP_TRP.1: 7
pdf_data/st_keywords/cc_claims
  • O:
    • O.HDIM: 7
    • O.HRA: 7
    • O.HUDI: 3
  • A:
    • A.CAP_FILE: 3
    • A.DELETION: 3
    • A.OS-UPDATE-EVIDENCE: 3
    • A.SECURE_ACODE_MANAGEMENT: 3
    • A.VERIFICATION: 3
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.APP_KEYS: 1
    • D.CRYPTO: 5
    • D.JCS_CODE: 6
    • D.JCS_DATA: 8
    • D.OS-: 1
    • D.OS-UPDATE-CODE-ID: 3
    • D.OS-UPDATE_ADDITIONALCODE: 5
    • D.OS-UPDATE_DEC-KEY: 2
    • D.OS-UPDATE_SGNVER-KEY: 2
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.AES: 1
    • O.ALARM: 15
    • O.APPLET: 28
    • O.ARRAY_VIEWS_CONFID: 7
    • O.ARRAY_VIEWS_INTEG: 3
    • O.CARD-MANAGEMENT: 1
    • O.CARD_MANAGEMENT: 17
    • O.CIPHER: 10
    • O.CODE_CAP_FILE: 23
    • O.CONFID-OS-UPDATE: 3
    • O.DELETION: 4
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 9
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.INSTALL: 7
    • O.JAVAOBJECT: 68
    • O.KEY-MNGT: 6
    • O.LOAD: 11
    • O.NATIVE: 11
    • O.OBJ-DELETION: 4
    • O.OBJ_DELETION: 4
    • O.OPERATE: 15
    • O.PIN-MNGT: 6
    • O.PIN_MNGT: 4
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.RND: 2
    • O.RNG: 10
    • O.SCP: 31
    • O.SECURE_AC_ACTIVATION: 4
    • O.SECURE_LOAD_ACODE: 9
    • O.SID: 13
    • O.TDES: 1
    • O.TOE_IDENTIFICATION: 6
    • O.TRANSACTION: 6
  • OE:
    • OE.CAP_FILE: 5
    • OE.CARD-: 1
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 10
    • OE.OS-UPDATE-ENCRYPTION: 5
    • OE.OS-UPDATE-EVIDENCE: 2
    • OE.SCP: 2
    • OE.SECURE_ACODE_MANAGEMENT: 2
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_T_ALOAD: 3
    • OP.ARRAY_T_ASTORE: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_CAP_FILE: 4
    • OP.DELETE_CAP_FILE_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.ADDITIONAL_CODE_ENCRYPTION: 3
    • OSP.ADDITIONAL_CODE_SIGNING: 3
    • OSP.ATOMIC_ACTIVATION: 3
    • OSP.RNG: 3
    • OSP.TOE_IDENTIFICATION: 3
    • OSP.VERIFICATION: 3
  • OT:
    • OT.X: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.CONFID-OS-UPDATE_LOAD: 3
    • T.DELETION: 3
    • T.EXE-CODE: 6
    • T.FAKE-SGNVER-KEY: 3
    • T.INSTALL: 3
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 6
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-OS-UPDATE_LOAD: 3
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.SID: 6
    • T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
    • T.WRONG-UPDATE-STATE: 3
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 13
    • Huawei Technologies Co: 6
  • Gemalto:
    • Gemalto: 9
  • Infineon:
    • Infineon: 17
  • Thales:
    • Thales: 42
pdf_data/st_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 2
      • HMAC-SHA-512: 2
  • AES_competition:
    • AES:
      • AES: 29
      • AES-256: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 14
      • Triple-DES: 3
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 3
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDSA:
      • ECDSA: 1
  • ECC:
    • ECC:
      • ECC: 13
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 14
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 2
  • SHA:
    • SHA2:
      • SHA-256: 3
      • SHA-512: 3
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
      • SHA2: 1
      • SHA224: 1
    • SHA3:
      • SHA3: 2
      • SHA3-384: 1
      • SHA3-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 6
    • Key agreement: 2
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 158
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 2
    • RNG: 36
pdf_data/st_keywords/cipher_mode
  • CCM:
    • CCM: 6
  • GCM:
    • GCM: 3
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • malfunction: 1
  • SCA:
    • Side-channel: 2
    • side-channel: 2
  • FI:
    • Malfunction: 5
    • Physical Tampering: 3
    • fault induction: 2
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 6
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • other:
    • TEE: 7
  • IBM:
    • SE: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
    • EF.DG3: 1
    • EF.DG4: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-4: 5
    • FIPS186-4: 1
    • FIPS198-1: 3
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 6
  • BSI:
    • AIS20: 1
    • AIS31: 6
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS180-2: 1
    • FIPS197: 5
  • ICAO:
    • ICAO: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 7
    • PKCS#5: 5
  • SCP:
    • SCP01: 4
    • SCP02: 4
    • SCP03: 5
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 8
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes MultiApp V5: JCS Security Target ST Ref: D1494591_LITE: 1
    • Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start MultiApp V5: JCS Security: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 4
    • the scope because done before the JCVM entering (selection of the applet) Note: The Array View is out of scope of this modelisation ADV_SPM.1.2D For each policy covered by the formal security policy model, the: 1
pdf_data/st_metadata
  • /Author: wtest222
  • /CreationDate: D:20230831164842+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20230831164842+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: XXX Procedure
  • pdf_file_size_bytes: 1122771
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /Author: D1417544
  • /CreationDate: D:20211021152816+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: 28-03-2018
  • /ModDate: D:20211021152816+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 1.12
  • /Title: MultiApp V4.1: JCS Security Target
  • pdf_file_size_bytes: 3796482
  • pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 147
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different