Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0)
ANSSI-CC-2019/32
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
CCEVS-VR-VID-10443-2012
name IDeal Citiz v2.3-n embedding ID.me 1.6-n application (ID.me 1.6-n / 2.1.6.0.0) Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
category ICs, Smart Cards and Smart Card-Related Devices and Systems Detection Devices and Systems
scheme FR US
not_valid_after 21.08.2024 01.11.2014
not_valid_before 21.08.2019 01.10.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_32fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_32en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf
manufacturer Idemia Tenable Network Security, Inc.
manufacturer_web https://www.idemia.com https://www.tenable.com/
security_level AVA_VAN.5, ALC_DVS.2, EAL5+ EAL2+, ALC_FLR.2
dgst 33e4966c9899cb42 7a9d9dd29e76bfba
heuristics/cert_id ANSSI-CC-2019/32 CCEVS-VR-VID-10443-2012
heuristics/cert_lab CEA US
heuristics/cpe_matches {} cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:*
heuristics/related_cves {} CVE-2023-6062, CVE-2021-20079, CVE-2023-3252, CVE-2021-3450, CVE-2017-18214, CVE-2018-5407, CVE-2022-22827, CVE-2021-46143, CVE-2022-22822, CVE-2022-22826, CVE-2024-0955, CVE-2020-5765, CVE-2016-1000029, CVE-2022-3499, CVE-2018-1141, CVE-2022-33757, CVE-2019-1559, CVE-2023-3251, CVE-2021-45960, CVE-2022-23852, CVE-2022-28291, CVE-2022-0778, CVE-2022-32973, CVE-2022-4313, CVE-2017-5179, CVE-2019-3982, CVE-2020-5774, CVE-2022-23990, CVE-2021-3449, CVE-2022-22825, CVE-2019-3962, CVE-2018-20843, CVE-2016-4055, CVE-2016-9260, CVE-2024-0971, CVE-2019-3961, CVE-2022-22824, CVE-2018-1147, CVE-2016-1000028, CVE-2018-1148, CVE-2023-3253, CVE-2019-3923, CVE-2022-32974, CVE-2021-20106, CVE-2021-20135, CVE-2022-22823, CVE-2023-6178
heuristics/extracted_sars ALC_CMS.5, ASE_INT.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ASE_ECD.1 ADV_FSP.2, ALC_CMC.2, AGD_PRE.1, ADV_ARC.1, ALC_CMS.2, ATE_FUN.1, ALC_DEL.1, AGD_OPE.1, ATE_COV.1, ADV_TDS.1, ALC_FLR.2, ATE_IND.2, AVA_VAN.2
heuristics/extracted_versions 2.1.6.0.0, 1.6, 2.3 3.6, 4.4, 2.1, 5.0.1, 2.0.1
heuristics/scheme_data
  • cert_id: ANSSI-CC-2019/32
  • description: Le produit évalué est l’applet Java Card «IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0 », développé par Idemia et NXP Semiconductors. Ce produit offre des services d’authentification et de signature électronique (SSCD) conformes aux spécifications IAS ECC v1.0.1. Il est embarqué sur la plateforme Java Card ouverte « NXP JCOP 3 P60 » (avec ou sans patch P
  • developer: Idemia, NXP Semiconductors
  • enhanced:
  • level: EAL5+
  • product: IDeal Citiz v2.3-n embedding ID.me 1.6-n application, version ID.me 1.6-n / 2.1.6.0.0
  • sponsor: Idemia
  • url: https://cyber.gouv.fr/produits-certifies/ideal-citiz-v23-n-embedding-idme-16-n-application-version-idme-16-n-21600
  • category: Enterprise Security Management
  • certification_date: 01.10.2012
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10443
  • product: Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1. Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10443
  • vendor: Tenable, Inc
heuristics/st_references/directly_referencing BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1059-2018 {}
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1059-2018 {}
maintenance_updates
protection_profiles



pdf_data/report_filename anssi-cc-2019_32fr.pdf st_vid10443-vr.pdf
pdf_data/report_frontpage
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2019/32
    • cert_item: IDeal Citiz v2.3-n embedding ID.me 1.6-n application
    • cert_item_version: ID.me 1.6-n / 2.1.6.0.0
    • cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France NXP Semiconductors Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire IDEMIA 2 place Samuel Champlain 92400 Courbevoie, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.0.1, certifié BSI-CC-PP-0059-2009-MA-01 le 21 février 2012; Part 3: Device with key import, v1.0.2, certifié BSI-CC-PP-0075-2012 le 27 septembre 2012 ; Part 4: Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, certifié BSI-CC-PP-0071-2012 le 12 décembre 2012 ; Part 5: Extension for device with key generation and trusted communication with signature creation application, v1.0.1, certifié BSI-CC-PP-0072-2012 le 12 décembre 2012 ; Part 6: Extension for device with key import and trusted communication with signature creation application, v1.0.4, certifié BSI-CC-PP-0076-2013 le 16 avril 2013
  • US:
  • FR:
  • US:
    • cert_id: CCEVS-VR-VID10443-2012
    • cert_item: Tenable SecurityCenter 4 and Components
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1059-: 1
  • FR:
    • ANSSI-CC-2019/32: 19
  • US:
    • CCEVS-VR-VID10443-2012: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0076-: 1
    • BSI-CC-PP-0076-2013: 1
    • BSI-CC-PP-0086-: 1
  • other:
    • PP-SSCD-: 6
    • PP-SSCD-Part2: 1
    • PP-SSCD-Part4: 1
    • PP-SSCD-Part5: 1
    • PP-SSCD-Part6: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 2: 4
    • EAL 2 augmented: 3
    • EAL 4: 1
    • EAL2: 1
    • EAL2+: 3
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
  • ALC:
    • ALC_FLR.2: 5
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ASCOPE: 1
    • A.DYNMIC: 1
    • A.LOCATE: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.NOTRST: 1
    • A.OS: 1
    • A.PROTCT: 1
    • A.WKSTN: 1
  • T:
    • T.COMDIS: 1
    • T.COMINT: 1
    • T.FACCNT: 1
    • T.FALACT: 1
    • T.FALASC: 1
    • T.FALREC: 1
    • T.IMPCON: 1
    • T.INADVE: 1
    • T.INFLUX: 1
    • T.LOSSOF: 1
    • T.MISACT: 1
    • T.MISUSE: 1
    • T.NOHALT: 1
    • T.PRIVIL: 1
    • T.SCNCFG: 1
    • T.SCNMLC: 1
    • T.SCNVUL: 1
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 24
  • NXP:
    • NXP: 9
    • NXP Semiconductors: 1
  • Oberthur:
    • Oberthur Technologies: 1
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 2
  • CESTI:
    • CESTI: 3
  • Serma:
    • SERMA: 8
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 3: 5
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_metadata
  • /Author: Géraldine Avoué
  • /CreationDate: D:20190913105844+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.29
  • /ModDate: D:20190913105844+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: IDeal Citiz v2.3-n embedding ID.me 1.6-n application
  • /Title: ANSSI-CC-2019/32
  • pdf_file_size_bytes: 732853
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Author: Evaluation Team
  • /CreationDate: D:20121024103543
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: VR
  • /ModDate: D:20121024103543
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Validator Report
  • /Title: Validation Report for IronPort Messaging Gateway
  • pdf_file_size_bytes: 441073
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename anssi-cible-cc-2019_32en.pdf st_vid10443-st.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0973-2016: 1
    • BSI-DSZ-CC-1059-2018: 3
  • NL:
    • CC-16-67206-CR: 1
    • CC-18-67206: 2
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0076-2013: 1
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0086: 1
  • other:
    • PP-SSCD2: 22
    • PP-SSCD3: 22
    • PP-SSCD4: 22
    • PP-SSCD5: 23
    • PP-SSCD6: 21
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL 5+: 1
    • EAL4+: 1
    • EAL5: 6
    • EAL5 augmented: 4
    • EAL5+: 1
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 9
    • EAL2 augmented: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 5
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 8
    • ADV_IMP.1: 8
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 8
  • AGD:
    • AGD_OPE: 6
    • AGD_OPE.1: 5
    • AGD_PRE: 7
    • AGD_PRE.1: 5
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 8
    • ALC_LCD.1: 3
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 7
  • ADV:
    • ADV_ARC.1: 22
    • ADV_FSP.2: 12
    • ADV_TDS.1: 12
  • AGD:
    • AGD_OPE.1: 11
    • AGD_PRE.1: 7
  • ALC:
    • ALC_CMC.2: 8
    • ALC_CMS.2: 8
    • ALC_DEL.1: 6
    • ALC_FLR.2: 22
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 9
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 24
    • FCS_CKM.1: 25
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 31
    • FCS_CKM.4.1: 1
    • FCS_COP: 41
    • FCS_COP.1: 17
    • FCS_COP.1.1: 1
    • FCS_RND: 5
    • FCS_RND.1: 20
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 67
    • FDP_ACC.1: 19
    • FDP_ACF: 56
    • FDP_ACF.1: 30
    • FDP_DAU: 9
    • FDP_DAU.2: 2
    • FDP_IFC.1: 9
    • FDP_ITC: 11
    • FDP_ITC.1: 9
    • FDP_ITC.2: 6
    • FDP_RIP.1: 25
    • FDP_RIP.1.1: 1
    • FDP_SDI: 20
    • FDP_SDI.2: 4
    • FDP_UCT: 22
    • FDP_UCT.1: 2
    • FDP_UIT: 18
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 36
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 19
    • FIA_API.1: 12
    • FIA_API.1.1: 2
    • FIA_SOS.2: 1
    • FIA_UAU: 93
    • FIA_UAU.1: 23
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 1
    • FIA_UAU.5: 3
    • FIA_UAU.6: 2
    • FIA_UID: 34
    • FIA_UID.1: 25
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 5
    • FMT_LIM.1: 14
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 13
    • FMT_LIM.2.1: 2
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 21
    • FMT_MSA.1: 5
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 13
    • FMT_MSA.4.1: 1
    • FMT_MTD: 174
    • FMT_MTD.1: 15
    • FMT_MTD.3: 11
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 57
    • FMT_SMF.1.1: 1
    • FMT_SMR: 28
    • FMT_SMR.1: 37
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 16
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 15
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 17
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 73
    • FTP_ITC.1: 22
    • FTP_TRP.1: 4
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 6
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 4
    • FAU_SAR.3.1: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 5
    • FAU_SEL.1.1: 1
    • FAU_STG: 4
    • FAU_STG.2: 9
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 2
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 1
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 1
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MDT.1: 1
    • FMT_MOF: 2
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MTD: 2
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_SMF: 2
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.1: 5
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITA.1: 2
    • FPT_ITC.1: 2
    • FPT_ITI.1: 2
    • FPT_ITT: 2
    • FPT_ITT.1: 9
    • FPT_ITT.1.1: 1
    • FPT_STM: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CGA: 6
    • A.CSP: 9
    • A.SCA: 5
  • D:
    • D.SCD: 1
    • D.SVD: 1
  • OE:
    • OE.HID_VAD: 7
    • OE.HI_VAD: 2
  • A:
    • A.ACCESS: 3
    • A.ASCOPE: 3
    • A.DYNMIC: 3
    • A.LOCATE: 3
    • A.MANAGE: 3
    • A.NOEVIL: 3
    • A.NOTRST: 3
    • A.PROTCT: 3
  • O:
    • O.ACCESS: 12
    • O.AUDITS: 5
    • O.EADMIN: 5
    • O.EXPORT: 3
    • O.IDANLZ: 5
    • O.IDAUTH: 20
    • O.IDSCAN: 7
    • O.IDSENS: 7
    • O.INTEGR: 7
    • O.OFLOWS: 6
    • O.PROTCT: 11
    • O.RESPON: 5
  • OE:
    • OE.AUDIT_PROTECTION: 4
    • OE.AUDIT_SORT: 2
    • OE.CREDEN: 6
    • OE.INSTAL: 7
    • OE.INTROP: 5
    • OE.PERSON: 5
    • OE.PHYCAL: 6
    • OE.TIME: 4
  • T:
    • T.COMDIS: 3
    • T.COMINT: 3
    • T.FACCNT: 3
    • T.FALACT: 3
    • T.FALASC: 3
    • T.FALREC: 3
    • T.IMPCON: 3
    • T.INADVE: 3
    • T.INFLUX: 3
    • T.LOSSOF: 3
    • T.MISACT: 3
    • T.MISUSE: 3
    • T.NOHALT: 3
    • T.PRIVIL: 3
    • T.SCNCFG: 3
    • T.SCNMLC: 3
    • T.SCNVUL: 3
pdf_data/st_keywords/vendor
  • Idemia:
    • IDEMIA: 12
  • NXP:
    • NXP: 20
pdf_data/st_keywords/eval_facility
  • CEA-LETI:
    • CEA-LETI: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 20
  • DES:
    • 3DES:
      • 3DES: 10
      • TDES: 9
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 5
      • KMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 18
    • ECDH:
      • ECDH: 4
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 2
  • RSA:
    • RSA-OAEP: 1
    • RSA-PSS: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-224: 6
      • SHA-256: 5
      • SHA-384: 5
      • SHA-512: 6
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 120
  • PGP:
    • PGP: 1
  • SSH:
    • SSH: 18
  • TLS:
    • SSL:
      • SSL: 20
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 11
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 5
    • Physical Tampering: 1
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 7
  • SCA:
    • DPA: 3
    • SPA: 3
    • physical probing: 3
    • side channel: 1
    • timing attacks: 2
  • FI:
    • malfunction: 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 3: 10
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.ChipSecurity: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 2
  • CC:
    • CCMB-2012-09-004: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS PUB 180-2: 2
    • FIPS180-4: 1
  • ICAO:
    • ICAO: 2
  • ISO:
    • ISO/IEC 15408:2005: 2
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9797-1: 3
  • NIST:
    • NIST SP 800-38B: 1
  • PKCS:
    • PKCS#1: 4
    • PKCS1: 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • of the Common Criteria certified IDEMIA IDeal Pass v2.3-n JC with Privacy Protection applet (out of scope of this TOE). IDeal Citiz v2.3-n enforces separation of the data between the applets and associated: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: G509704
  • /CreationDate: D:20190717162824+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20190717162824+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: Title
  • pdf_file_size_bytes: 2697853
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 142
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different