Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ST33G1M2A and ST33G1M2M including optional cryptographic library NesLib (C03) (ANSSI-CC-2020/23-R01)
ANSSI-CC-2020/23-R01
IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/52-R01)
ANSSI-CC-2020/52-R01
name ST33G1M2A and ST33G1M2M including optional cryptographic library NesLib (C03) (ANSSI-CC-2020/23-R01) IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/52-R01)
not_valid_after 27.02.2029 10.11.2028
not_valid_before 27.02.2024 10.11.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_23-R01fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2020_52-R01.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_23-R01fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_52-R01fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_23-R01en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_52-R01en.pdf
manufacturer STMicroelectronics Idemia
manufacturer_web https://www.st.com/ https://www.idemia.com
dgst 3e61a5124adca691 ae1a3fd4952c639d
heuristics/cert_id ANSSI-CC-2020/23-R01 ANSSI-CC-2020/52-R01
heuristics/extracted_sars ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2 AGD_OPE.1, ALC_DVS.2, ATE_DPT.1, AVA_VAN.5, ADV_ARC.1, ADV_TDS.3
heuristics/extracted_versions 23, 2020 1.3, 8.2
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1059-V5-2022, ANSSI-CC-2020/26-R01
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1059-V5-2022, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2020/26-R01, BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1059-V4-2021, BSI-DSZ-CC-1059-V2-2019
heuristics/scheme_data
  • cert_id: ANSSI-CC-2020/23-R01
  • description: Le produit évalué est « ST33G1M2A and ST33G1M2M including optional cryptographic library NesLib, C03 » développé par STMICROELECTRONICS. Le microcontrôleur seul n’est pas un produit utilisable en tant que tel. Il est destiné à héberger une ou plusieurs applications. Il peut être inséré dans un support plastique pour constituer une carte à puce. Les usages possibles de cette carte sont multiples (
  • developer: STMICROELECTRONICS
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Micro-circuits
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2020/23-R01
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_23-R01fr.pdf
    • certification_date: 2024-02-27
    • developer: STMICROELECTRONICS
    • evaluation_facility: THALES / CNES
    • expiration_date: 2029-02-27
    • level: EAL5+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Loader dedicated for usage in Secured Environment only”
    • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2020_23-R01fr.pdf
    • sponsor: STMICROELECTRONICS
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_23-R01en.pdf
  • expiration_date: 2029-02-27
  • level: EAL5+
  • product: ST33G1M2A and ST33G1M2M including optional cryptographic library NesLib (C03)
  • sponsor: STMICROELECTRONICS
  • url: https://cyber.gouv.fr/produits-certifies/st33g1m2a-and-st33g1m2m-including-optional-cryptographic-library-neslib-c03
  • cert_id: ANSSI-CC-2020/52-R01
  • description: Le produit évalué est « IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VB, Identification de l’application : F0 02 02 13 » développé par IDEMIA et masquée sur le composant NXP P6022M VB développé par NXP SEMICONDUCTORS GMBH
  • developer: IDEMIA et NXP SEMICONDUCTORS GMBH
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2020/52-R01
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2020_52-R01.pdf
    • certification_date: 2023-11-10
    • developer: IDEMIA et NXP SEMICONDUCTORS GMBH
    • evaluation_facility: CEA-LETI
    • expiration_date: 2028-11-10
    • level: EAL5+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: Protection profiles for secure signature creation device: Part 2 : Device with key generation, BSI-CC-PP-0059-2009-MA-01 Part 3 : Device with key import, BSI-CC-PP-0075-2012 Part 4 : Extension for device with key generation and trusted communication with certificate generation application, BSI-CC-PP-0071-2012
    • sponsor: IDEMIA
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2020_52-R01en.pdf
  • expiration_date: 2028-11-10
  • level: EAL5+
  • product: IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VB Identification de l’application : F0 02 02 13
  • sponsor: IDEMIA
  • url: https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-version-13-configuration-3-id-one-cosmo-v82-open-platform-nxp-p6022m
protection_profiles

pdf_data/cert_filename Certificat-CC-2020_23-R01fr.pdf Certificat-CC-2020_52-R01.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2020/23-R01: 2
  • FR:
    • ANSSI-CC-2020/52-R01: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0075-2012: 1
pdf_data/cert_keywords/vendor
  • Idemia:
    • IDEMIA: 2
  • NXP:
    • NXP: 2
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 1
pdf_data/cert_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/cert_metadata
  • /Author: DUCLOS Charlene
  • /Category:
  • /Comments: ANSSI-CC-CER-F-14_v14.8
  • /Company: SGDSN
  • /CreationDate: D:20240229102046+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords: version x.x, révision x
  • /ModDate: D:20240229102048+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • /SourceModified: D:20240229092020
  • /Title: ANSSI-CC-2020/23-R01
  • pdf_file_size_bytes: 145074
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20231117171637+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20231117172055+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 158272
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC-2020_23-R01fr.pdf ANSSI-CC-2020_52-R01fr.pdf
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2020/23-R01: 2
  • DE:
    • BSI-DSZ-CC-1059-V5-2022: 2
  • FR:
    • ANSSI-CC-2020/26-R01: 1
    • ANSSI-CC-2020/52-R01: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 2
    • BSI-CC-PP-0071-2012: 2
    • BSI-CC-PP-0075-2012: 2
    • BSI-PP-0084-2014: 1
  • other:
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
  • ADV:
    • ADV_OPE: 1
    • ADV_PRE: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 4
    • AGD_QUA: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • Idemia:
    • IDEMIA: 4
  • NXP:
    • NXP: 10
    • NXP Semiconductors: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 9
pdf_data/report_keywords/cplc_data
  • ICVersion:
    • IC Version: 1
pdf_data/report_metadata
pdf_data/st_filename ANSSI-cible-CC-2020_23-R01en.pdf ANSSI-cible-CC-2020_52-R01en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2020/26-R1: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0084-2014: 8
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0084-2014: 53
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0071: 1
    • BSI-CC-PP-0075: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 1
    • EAL5: 17
    • EAL5 augmented: 2
    • EAL5+: 1
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 1
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL5: 6
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 4
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 4
    • ASE_CCL.1: 1
    • ASE_ECD: 4
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 8
    • ASE_OBJ.2: 1
    • ASE_REQ: 26
    • ASE_REQ.2: 1
    • ASE_SPD: 8
    • ASE_SPD.1: 1
    • ASE_TSS: 10
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 3
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 2
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_TDS: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE: 11
    • AGD_OPE.1: 2
    • AGD_PRE: 14
    • AGD_PRE_PLT: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 2
    • ALC_DVS.2: 7
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 2
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 2
    • FAU_SAS.1: 6
  • FCS:
    • FCS_CKM.1: 20
    • FCS_CKM.4: 4
    • FCS_COP.1: 36
    • FCS_RNG: 2
    • FCS_RNG.1: 6
  • FDP:
    • FDP_ACC.1: 25
    • FDP_ACC.2: 12
    • FDP_ACF.1: 35
    • FDP_CKM.2: 1
    • FDP_IFC.1: 16
    • FDP_ITC.1: 13
    • FDP_ITC.2: 2
    • FDP_ITT.1: 10
    • FDP_SDC: 2
    • FDP_SDC.1: 8
    • FDP_SDI.2: 8
    • FDP_SMF.1: 2
    • FDP_SMR.1: 1
  • FIA:
    • FIA_UID.1: 10
  • FMT:
    • FMT_ITC.1: 1
    • FMT_LIM: 2
    • FMT_LIM.1: 17
    • FMT_LIM.2: 18
    • FMT_MSA.1: 24
    • FMT_MSA.3: 33
    • FMT_SMF.1: 16
    • FMT_SMR.1: 16
  • FPT:
    • FPT_FLS.1: 11
    • FPT_ITT.1: 9
    • FPT_PHP.3: 11
  • FRU:
    • FRU_FLT.2: 11
  • FAU:
    • FAU_ARP.1: 2
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 34
    • FCS_CKM.1: 41
    • FCS_CKM.2: 8
    • FCS_CKM.3: 6
    • FCS_CKM.4: 60
    • FCS_CKM.4.1: 1
    • FCS_COP: 104
    • FCS_COP.1: 38
    • FCS_COP.1.1: 3
    • FCS_RNG: 4
    • FCS_RNG.1: 19
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
  • FDP:
    • FDP_ACC: 70
    • FDP_ACC.1: 38
    • FDP_ACF: 49
    • FDP_ACF.1: 36
    • FDP_CKM: 4
    • FDP_CKM.1: 1
    • FDP_DAU: 6
    • FDP_DAU.1: 1
    • FDP_DAU.2: 2
    • FDP_ETC: 5
    • FDP_ETC.1: 2
    • FDP_IFC.1: 20
    • FDP_ITC: 21
    • FDP_ITC.1: 42
    • FDP_ITC.2: 35
    • FDP_RIP: 11
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 3
    • FDP_ROL: 1
    • FDP_SDI: 15
    • FDP_SDI.1: 2
    • FDP_SDI.2: 6
    • FDP_UCT: 7
    • FDP_UCT.1: 1
  • FIA:
    • FIA_AFL: 22
    • FIA_AFL.1: 3
    • FIA_AFL.1.1: 1
    • FIA_API: 5
    • FIA_API.1: 9
    • FIA_API.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 30
    • FMT_MSA.1: 7
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 31
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 8
    • FMT_MSA.4.1: 1
    • FMT_MTD: 40
    • FMT_MTD.1: 6
    • FMT_SMF.1: 43
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 43
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 3
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 7
    • FPT_EMS.1: 9
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 2
    • FPT_FLS: 5
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP: 2
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
    • FPT_RCV: 2
    • FPT_TST: 1
    • FPT_TST.1: 13
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 18
    • FTP_ITC.1: 8
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • O:
    • O.C: 3
    • O.RND: 4
  • R:
    • R.O: 3
  • T:
    • T.RND: 3
  • A:
    • A.APPLET: 1
    • A.CGA: 5
    • A.CSP: 5
    • A.PLT: 1
    • A.SCA: 3
    • A.VERIFICATION: 1
  • OE:
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
    • OE.CODE_EVIDENCE: 2
    • OE.HID_VAD: 4
    • OE.PLT: 2
    • OE.VERIFICATION: 4
  • OSP:
    • OSP.PLT: 2
    • OSP.VERIFICATION: 1
  • T:
    • T.CONFID_APPLI_DATA: 3
    • T.INTEG_APPLI_DATA: 6
    • T.OBJ_DELETION: 3
    • T.PHYSICAL: 3
    • T.RESSOURCES: 3
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
  • STMicroelectronics:
    • STMicroelectronics: 25
  • Idemia:
    • IDEMIA: 21
  • Morpho:
    • Morpho: 1
  • NXP:
    • NXP: 4
  • Oberthur:
    • Oberthur Technologies: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 16
      • AES-128: 1
      • AES-192: 1
      • AES-256: 1
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 10
    • DES:
      • DES: 12
  • constructions:
    • MAC:
      • CBC-MAC: 3
      • CMAC: 3
      • HMAC: 4
  • AES_competition:
    • AES:
      • AES: 17
  • DES:
    • 3DES:
      • TDES: 3
    • DES:
      • DES: 10
  • constructions:
    • MAC:
      • CMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 4
    • EdDSA:
      • EdDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 10
  • ECC:
    • ECC:
      • ECC: 34
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • DH: 5
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • Keccak:
    • Keccak: 14
  • SHA:
    • SHA1:
      • SHA-1: 15
    • SHA2:
      • SHA-2: 3
      • SHA-224: 5
      • SHA-256: 9
      • SHA-384: 7
      • SHA-512: 7
    • SHA3:
      • SHA-3: 6
      • SHA3-224: 4
      • SHA3-256: 4
      • SHA3-384: 4
      • SHA3-512: 4
  • SHAKE:
    • SHAKE128: 4
    • SHAKE256: 4
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-224: 2
      • SHA-256: 5
      • SHA-384: 2
pdf_data/st_keywords/crypto_scheme
  • KEM:
    • KEM: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 10
  • RNG:
    • RND: 7
    • RNG: 6
  • TRNG:
    • TRNG: 3
  • RNG:
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • CCM:
    • CCM: 3
  • ECB:
    • ECB: 9
  • GCM:
    • GCM: 3
  • CBC:
    • CBC: 10
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NesLib : 9
    • NesLib 283: 1
    • NesLib 284: 1
    • NesLib 287: 1
    • NesLib 290: 1
    • NesLib 294: 1
    • NesLib 295: 1
    • NesLib 296: 1
    • NesLib 298: 1
    • NesLib 299: 1
    • NesLib 6.3: 2
    • NesLib 6.3.4: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 13
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 12
    • Physical Probing: 4
    • physical probing: 3
    • side channel: 9
  • FI:
    • DFA: 2
    • fault injection: 2
    • physical tampering: 5
  • SCA:
    • DPA: 1
    • SPA: 1
    • side channel: 1
    • timing attacks: 1
  • other:
    • JIL: 1
    • JIL-COMP: 2
pdf_data/st_keywords/tee_name
  • other:
    • T6: 1
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 3
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 23
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS PUB 140-2: 5
    • FIPS PUB 180-2: 5
    • FIPS PUB 186-4: 4
    • FIPS PUB 197: 4
    • FIPS PUB 198-1: 3
    • FIPS PUB 202: 6
  • ISO:
    • ISO/IEC 13239: 2
    • ISO/IEC 14888: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9796: 1
    • ISO/IEC 9796-2: 3
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38B: 2
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-56A: 3
    • NIST SP 800-67: 3
    • NIST SP 800-90: 4
    • SP 800-38A: 3
    • SP 800-38C: 1
    • SP 800-38D: 1
    • SP 800-67: 1
    • SP 800-90A: 1
  • PKCS:
    • PKCS #1: 6
    • PKCS1: 1
  • FIPS:
    • FIPS 180-3: 1
    • FIPS PUB 180-3: 1
    • FIPS180-3: 1
  • ISO:
    • ISO/IEC 9796-2: 4
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 3
    • PKCS#15: 2
    • PKCS#3: 3
  • SCP:
    • SCP02: 2
    • SCP03: 7
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 39 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except NesLib when it is embedded: 1
    • 3]. 39 The Security IC Embedded Software (ES) is in User NVM. The ES is not part of the TOE and is out of scope of the evaluation, except NesLib when it is embedded. a. Note that SHA-1 is no longer recommended: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: IDEMIA
  • /CreationDate: D:20230922152616+02'00'
  • /Creator: Microsoft® Word pour Microsoft 365
  • /Keywords: Quality
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Application: Microsoft Azure Information Protection
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Enabled: True
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Extended_MSFT_Method: Automatic
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Name: Public
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Owner: [email protected]
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_Ref: https://api.informationprotection.azure.com/api/7694d41c-5504-43d9-9e40-cb254ad755ec
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SetDate: 2019-08-02T11:40:31.1231964+02:00
  • /MSIP_Label_431684b1-a5da-4051-9fb4-5631703e02d5_SiteId: 7694d41c-5504-43d9-9e40-cb254ad755ec
  • /ModDate: D:20230922152616+02'00'
  • /Producer: Microsoft® Word pour Microsoft 365
  • /Subject: FQR standard
  • pdf_file_size_bytes: 1869456
  • pdf_hyperlinks: ftp://ftp.itc.1/SVD, ftp://ftp.itc.1/SCD
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different