Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Plateforme ID-One Cosmo v8.1-N-Standard LDS masquée sur le composant NXP P6021M VB
ANSSI-CC-2017/47
IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2
ANSSI-CC-2020/50
name Plateforme ID-One Cosmo v8.1-N-Standard LDS masquée sur le composant NXP P6021M VB IAS ECC V2, version 1.3 en configuration #1 sur la plateforme ID-One Cosmo v8.2
not_valid_before 2017-09-05 2020-07-09
not_valid_after 2022-09-05 2025-07-09
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2017_47en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_50en.pdf
status archived active
manufacturer Oberthur Technologies Idemia
manufacturer_web https://www.oberthur.com/ https://www.idemia.com
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_47fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_50fr.pdf
cert_link None https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2020_50fr.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2022, 11, 17), 'maintenance_title': 'Reassessment report : ANSSI-CC-2019/33-S01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_33-s01.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2019_33-s01.pdf'})
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash None cb60c2e9aea8759d145398365b3da7d2223c6f122895781e6811957ea2a73ac5
state/cert/txt_hash None c44103ecddb010487fa9510fdda5ed2cbd952c022d87ae38422376fcc9a20698
state/report/pdf_hash e9806fa5e6627c559dd66f74c6b87fef7e8694f442eb5dd7eabde2eae1ff444f 310c778f77407662661dc58dd846709ec4aed8dffec6092bd1fc8a4c6779a10d
state/report/txt_hash bc5bb50a6285fc195226a49c3ab6f53ba1fed83a2bc15d3f4bc37ce30a0652fb 44646fbf756907f1f2228a737bdd6dd4d5e82b5bb8493878bae9e6a0d5b50fef
state/st/pdf_hash cf252ce40ae32504cecc5cb4d0e25925bd1194fe816fd3203b1263cc52f82e6e 461267908ae9a30464af51c030edb4cc3c44ef6caa4c23ba67c1ce71fc692084
state/st/txt_hash 24413aba53a23aeac8194bbd3dc9f08ff18e82b1c594b13e9f252a4c5df88785 ea2968b94068c6ee936ba1da547b8e425e3401e76327575d78e2bee8f54bc60a
heuristics/cert_id ANSSI-CC-2017/47 ANSSI-CC-2020/50
heuristics/extracted_versions 8.1 8.2, 1.3
heuristics/report_references/directly_referenced_by ANSSI-CC-2018/03, ANSSI-CC-2017/72, ANSSI-CC-2017/69, ANSSI-CC-2017/70, ANSSI-CC-2018/06, ANSSI-CC-2018/05, ANSSI-CC-2017/68, ANSSI-CC-2017/71, ANSSI-CC-2018/04 None
heuristics/report_references/directly_referencing BSI-DSZ-CC-0955-V2-2016 ANSSI-CC-2020/26, ANSSI-CC-2019/33, BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2018/03, ANSSI-CC-2017/72, ANSSI-CC-2019/47, ANSSI-CC-2019/49, ANSSI-CC-2019/48, ANSSI-CC-2020/36, ANSSI-CC-2017/68, ANSSI-CC-2020/35, ANSSI-CC-2020/38, ANSSI-CC-2018/05, ANSSI-CC-2017/69, ANSSI-CC-2017/70, ANSSI-CC-2019/50, ANSSI-CC-2018/06, ANSSI-CC-2017/71, ANSSI-CC-2018/04, ANSSI-CC-2020/37 None
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0955-V2-2016, BSI-DSZ-CC-0955-2016 ANSSI-CC-2019/33, BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1059-V2-2019, ANSSI-CC-2020/26, ANSSI-CC-2017/49, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0973-V2-2016, ANSSI-CC-2019/28
heuristics/scheme_data
  • product: Plateforme ID-One Cosmo v8.1-N - Standard LDS, masquée sur le composant NXP P6021M VB
  • url: https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v81-n-standard-lds-masquee-sur-le-composant-nxp-p6021m
  • description: Le produit certifié est la plateforme ouverte Java Card : « plateforme ID-One Cosmo v8.1-N - Standard LDS, masquée sur le composant NXP P6021M VB » dont l’identification du matériel est 083621. La version de la plateforme évaluée inclut les patchs identifiés au chapitre 1.2.4 du présent rapport. Elle est développée par OBERTHUR TECHNOLOGIES et embarquée sur le microcontrôleur NXP P6021M VB, dévelo
  • sponsor: Oberthur Technologies
  • developer: Oberthur Technologies, NXP Semiconductors GmbH
  • cert_id: 2017/47
  • level: EAL5+
  • enhanced:
    • cert_id: 2017/47
    • certification_date: 05/09/2017
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r4
    • developer: Oberthur Technologies, NXP Semiconductors GmbH
    • sponsor: Oberthur Technologies
    • evaluation_facility: CEA - LETI
    • level: EAL5+
    • protection_profile: PP JCS-O
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • report_link: https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_47fr.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cible-cc-2017_47en.pdf
  • product: IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2
  • url: https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-version-13-en-configuration-4-sur-la-plateforme-id-one-cosmo-v82-0
  • description: Le produit évalué est l’application « : IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2, Identification F0 02 02 13 » développée par Idemia et masquée sur le composant NXP P60D145 développé par NXP Semiconductors GmbH. Ce produit est une carte à puce constituée d’un logiciel conforme au standard IAS ECC v2 et d’un microcontrôleur sécurisés. Il est destiné à être ut
  • sponsor: Idemia, NXP Semiconductors GmbH
  • developer: Idemia, NXP Semiconductors GmbH
  • cert_id: 2020/53
  • level: EAL5+
  • expiration_date: 9 Juillet 2025
  • enhanced:
    • cert_id: 2020/53
    • certification_date: 09/07/2020
    • expiration_date: 09/07/2025
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • developer: Idemia, NXP Semiconductors GmbH
    • sponsor: Idemia, NXP Semiconductors GmbH
    • evaluation_facility: CEA-LETI
    • level: EAL5+
    • protection_profile: PP for secure signature creation device (Part 2, 3, 4)
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • report_link: https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cc-2020_53fr.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cible-cc-2020_53en.pdf
heuristics/scheme_data/cert_id 2017/47 2020/53
heuristics/scheme_data/description Le produit certifié est la plateforme ouverte Java Card : « plateforme ID-One Cosmo v8.1-N - Standard LDS, masquée sur le composant NXP P6021M VB » dont l’identification du matériel est 083621. La version de la plateforme évaluée inclut les patchs identifiés au chapitre 1.2.4 du présent rapport. Elle est développée par OBERTHUR TECHNOLOGIES et embarquée sur le microcontrôleur NXP P6021M VB, dévelo Le produit évalué est l’application « : IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2, Identification F0 02 02 13 » développée par Idemia et masquée sur le composant NXP P60D145 développé par NXP Semiconductors GmbH. Ce produit est une carte à puce constituée d’un logiciel conforme au standard IAS ECC v2 et d’un microcontrôleur sécurisés. Il est destiné à être ut
heuristics/scheme_data/developer Oberthur Technologies, NXP Semiconductors GmbH Idemia, NXP Semiconductors GmbH
heuristics/scheme_data/enhanced
  • cert_id: 2017/47
  • certification_date: 05/09/2017
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r4
  • developer: Oberthur Technologies, NXP Semiconductors GmbH
  • sponsor: Oberthur Technologies
  • evaluation_facility: CEA - LETI
  • level: EAL5+
  • protection_profile: PP JCS-O
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2, AVA_VAN.5
  • report_link: https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_47fr.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cible-cc-2017_47en.pdf
  • cert_id: 2020/53
  • certification_date: 09/07/2020
  • expiration_date: 09/07/2025
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r5
  • developer: Idemia, NXP Semiconductors GmbH
  • sponsor: Idemia, NXP Semiconductors GmbH
  • evaluation_facility: CEA-LETI
  • level: EAL5+
  • protection_profile: PP for secure signature creation device (Part 2, 3, 4)
  • mutual_recognition: SOG-IS CCRA
  • augmented: ALC_DVS.2, AVA_VAN.5
  • report_link: https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cc-2020_53fr.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cible-cc-2020_53en.pdf
heuristics/scheme_data/enhanced/cc_version Critères Communs version 3.1r4 Critères Communs version 3.1r5
heuristics/scheme_data/enhanced/cert_id 2017/47 2020/53
heuristics/scheme_data/enhanced/certification_date 05/09/2017 09/07/2020
heuristics/scheme_data/enhanced/developer Oberthur Technologies, NXP Semiconductors GmbH Idemia, NXP Semiconductors GmbH
heuristics/scheme_data/enhanced/evaluation_facility CEA - LETI CEA-LETI
heuristics/scheme_data/enhanced/protection_profile PP JCS-O PP for secure signature creation device (Part 2, 3, 4)
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cc-2017_47fr.pdf https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cc-2020_53fr.pdf
heuristics/scheme_data/enhanced/sponsor Oberthur Technologies Idemia, NXP Semiconductors GmbH
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/2017/09/anssi-cible-cc-2017_47en.pdf https://cyber.gouv.fr/sites/default/files/2020/07/anssi-cible-cc-2020_53en.pdf
heuristics/scheme_data/product Plateforme ID-One Cosmo v8.1-N - Standard LDS, masquée sur le composant NXP P6021M VB IAS ECC V2, version 1.3 en configuration #4 sur la plateforme ID-One Cosmo v8.2
heuristics/scheme_data/sponsor Oberthur Technologies Idemia, NXP Semiconductors GmbH
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/plateforme-id-one-cosmo-v81-n-standard-lds-masquee-sur-le-composant-nxp-p6021m https://cyber.gouv.fr/produits-certifies/ias-ecc-v2-version-13-en-configuration-4-sur-la-plateforme-id-one-cosmo-v82-0
heuristics/st_references/directly_referenced_by ANSSI-CC-2017/68 None
heuristics/st_references/directly_referencing BSI-DSZ-CC-0955-V2-2016 ANSSI-CC-2020/26
heuristics/st_references/indirectly_referenced_by ANSSI-CC-2017/68 None
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0955-V2-2016 ANSSI-CC-2020/26
pdf_data/cert_filename None certificat-2020_50fr.pdf
pdf_data/cert_keywords None
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2020/50: 2
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0059-2009-MA-01: 1
      • BSI-CC-PP-0075-2012: 1
      • BSI-CC-PP-0071-2012: 1
      • BSI-CC-PP-0072-2012: 1
      • BSI-CC-PP-0076-2013: 1
  • cc_security_level:
    • EAL:
      • EAL5: 1
      • EAL2: 1
  • cc_sar:
  • cc_sfr:
  • cc_claims:
  • vendor:
    • NXP:
      • NXP Semiconductors: 1
    • Idemia:
      • Idemia: 2
  • eval_facility:
    • CEA-LETI:
      • CEA - LETI: 1
  • symmetric_crypto:
  • asymmetric_crypto:
    • ECC:
      • ECC:
        • ECC: 1
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
pdf_data/cert_metadata None
  • pdf_file_size_bytes: 662537
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20200713154036+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20200713154036+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_filename anssi-cc-2017_47fr.pdf anssi-cc-2020_50fr.pdf
pdf_data/report_frontpage/FR/cc_version Critères Communs version 3.1 révision 4 Critères Communs version 3.1 révision 5
pdf_data/report_frontpage/FR/cert_id ANSSI-CC-2017/47 ANSSI-CC-2020/50
pdf_data/report_frontpage/FR/cert_item Plateforme ID-One Cosmo v8.1-N - Standard LDS, masquée sur le composant NXP P6021M VB IAS ECC v2, version 1.3 in configuration #1 on ID-One Cosmo v8.2 open platform
pdf_data/report_frontpage/FR/cert_item_version Identification du matériel 083621 Identification du patch générique 089051 Identification du patch additionnel 086694 Identification de l’applet : F0 02 02 13 Identification du matériel de la plateforme : 09 11 21 Identification du patch : 09 42 22
pdf_data/report_frontpage/FR/cert_lab CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
pdf_data/report_frontpage/FR/developer Oberthur Technologies 420 rue d’Estienne d’Orves, 92700 Colombes, France NXP Semiconductors GmbH Stresemannallee 101, 22539 Hamburg, Allemagne Commanditaire Oberthur Technologies 420 rue d’Estienne d’Orves, 92700 Colombes, France Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France NXP Semiconductors GmbH Troplowitzstrasse 20, 22529 Hamburg, Allemagne Commanditaire Idemia 2 place Samuel de Champlain, 92400 Courbevoie, France
pdf_data/report_frontpage/FR/ref_protection_profiles PP JCS-O] Java Card Protection Profile Open Configuration, version 3.0 Protection profiles for secure signature creation device : Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-01 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 30
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-0955-V2-2016: 3
  • BSI-DSZ-CC-1059-2018: 1
  • BSI-DSZ-CC-1059-V3-2019: 1
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2017/47: 18
  • ANSSI-CC-2020/50: 19
  • ANSSI-CC-2020/26: 2
  • ANSSI-CC-2019/33: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-2014: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03-: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-CC-PP-0071-2012: 1
    • BSI-CC-PP-0072-2012: 1
    • BSI-CC-PP-0076-2013: 1
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP- 0075-2012: 1
    • BSI-CC-PP- 0071-2012: 1
    • BSI-CC-PP- 0072-2012: 1
    • BSI-CC-PP-0076-: 1
    • BSI-PP-0084-2014: 1
  • other:
    • PP-SSCD-Part2: 1
    • PP-SSCD-Part4: 1
    • PP-SSCD-Part5: 1
    • PP-SSCD-Part6: 1
    • PP-SSCD-: 5
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-PP-0084-2014: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075-2012: 1
  • BSI-CC-PP-0071-2012: 1
  • BSI-CC-PP-0072-2012: 1
  • BSI-CC-PP-0076-2013: 1
  • BSI-CC-PP- 0059-2009-MA-01: 1
  • BSI-CC-PP- 0075-2012: 1
  • BSI-CC-PP- 0071-2012: 1
  • BSI-CC-PP- 0072-2012: 1
  • BSI-CC-PP-0076-: 1
  • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_sar/ADV
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_SPM: 1
  • ADV_TDS: 1
  • ADV_PRE: 1
  • ADV_OPE: 1
pdf_data/report_keywords/cc_sar/AGD
  • AGD_OPE: 4
  • AGD_PRE: 3
  • AGD_PRE: 5
  • AGD_OPE: 3
  • AGD_QUA: 2
  • AGD_PPRE: 1
  • AGD_POPE: 1
  • AGD_PDEV: 1
  • AGD_PALP: 1
pdf_data/report_keywords/cc_sar/AGD/AGD_OPE 4 3
pdf_data/report_keywords/cc_sar/AGD/AGD_PRE 3 5
pdf_data/report_keywords/cc_sar/ASE
  • ASE_TSS.2: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_OBJ: 1
  • ASE_REQ: 1
  • ASE_SPD: 1
  • ASE_TSS: 1
pdf_data/report_keywords/eval_facility/CEA-LETI
  • CEA - LETI: 1
  • CEA - LETI: 1
  • CEA-LETI: 1
pdf_data/report_keywords/eval_facility/CESTI/CESTI 1 3
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 1
  • CCMB-2012-09-002: 1
  • CCMB-2012-09-003: 1
  • CCMB-2012-09-004: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-004: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 30
    • NXP Semiconductors: 2
  • Oberthur:
    • Oberthur Technologies: 2
    • OBERTHUR: 7
  • NXP:
    • NXP Semiconductors: 3
    • NXP: 6
  • Idemia:
    • Idemia: 2
    • IDEMIA: 21
pdf_data/report_keywords/vendor/NXP/NXP 30 6
pdf_data/report_keywords/vendor/NXP/NXP Semiconductors 2 3
pdf_data/report_metadata
  • pdf_file_size_bytes: 1005663
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /CreationDate: D:20170908093050+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.025
  • /ModDate: D:20170911161249+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject:
  • /Title:
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_file_size_bytes: 144915
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Author:
  • /CreationDate: D:20200713152056+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20200713152056+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20170908093050+02'00' D:20200713152056+02'00'
pdf_data/report_metadata//Creator Microsoft® Word 2010 PScript5.dll Version 5.2.2
pdf_data/report_metadata//ModDate D:20170911161249+02'00' D:20200713152056+02'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 11.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 1005663 144915
pdf_data/report_metadata/pdf_hyperlinks mailto:[email protected], http://www.ssi.gouv.fr/
pdf_data/report_metadata/pdf_number_of_pages 17 18
pdf_data/st_filename anssi-cible-cc-2017_47en.pdf anssi-cible-cc-2020_50en.pdf
pdf_data/st_keywords/asymmetric_crypto/ECC
  • ECDH:
    • ECDH: 2
  • ECDSA:
    • ECDSA: 4
  • ECC:
    • ECC: 9
  • ECDSA:
    • ECDSA: 2
  • ECC:
    • ECC: 34
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 9 34
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 4 2
pdf_data/st_keywords/asymmetric_crypto/FF
  • DH:
    • Diffie-Hellman: 5
  • DH:
    • DH: 5
    • Diffie-Hellman: 1
  • DSA:
    • DSA: 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH
  • Diffie-Hellman: 5
  • DH: 5
  • Diffie-Hellman: 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 5 1
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0955-V2-2016: 2
    • BSI-DSZ-CC-0973-V2-: 1
    • BSI-DSZ-CC-0955-V2-: 2
  • FR:
    • ANSSI-CC-2020/26: 1
pdf_data/st_keywords/cc_claims
  • D:
    • D.BIO: 12
    • D.CONFIG: 4
    • D.SENSITIVE_DATA: 2
    • D.ARRAY: 6
    • D.JCS_KEYS: 7
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 4
    • D.PIN: 9
    • D.API_DATA: 3
    • D.CRYPTO: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.SEC_DATA: 7
    • D.NB_REMAINTRYGLB: 1
  • O:
    • O.IC: 2
    • O.TOE: 2
    • O.CARD_MANAGEMENT: 51
    • O.SCP: 57
    • O.RESIDENT_APPLICATION: 23
    • O.SECURE_COMPARE: 10
    • O.PATCH_LOADING: 26
    • O.BIO-: 2
    • O.SID: 33
    • O.FIREWALL: 64
    • O.GLOBAL_ARRAYS_CONFID: 20
    • O.GLOBAL_ARRAYS_INTEG: 12
    • O.NATIVE: 14
    • O.OPERATE: 38
    • O.REALLOCATION: 18
    • O.RESOURCES: 26
    • O.ALARM: 26
    • O.CIPHER: 19
    • O.KEY-MNGT: 26
    • O.PIN-MNGT: 27
    • O.BIO-MNGT: 23
    • O.TRANSACTION: 18
    • O.OBJ-DELETION: 9
    • O.DELETION: 14
    • O.LOAD: 17
    • O.INSTALL: 17
    • O.PIN-: 3
    • O.REMOTE: 4
    • O.APPLET: 16
    • O.CODE_PKG: 22
    • O.JAVAOBJECT: 49
    • O.REMOTE_MTHD: 1
    • O.REMOTE_OBJ: 1
    • O.ROR: 1
    • O.GLOBAL_ARRRAYS_INTEG: 1
    • O.GLOBAL_ARRRAYS_CONFID: 2
    • O.RND: 1
    • O.TDES: 1
    • O.AES: 1
    • O.CUST_RECONF_PLAIN: 1
    • O.FM_FW: 1
    • O.MEM_ACCESS: 1
    • O.SFR_ACCESS: 1
    • O.PUF: 1
  • T:
    • T.CONFIGURATION: 5
    • T.CONF_DATA_APPLET: 5
    • T.PATCH_LOADING: 5
    • T.CONFID-APPLI-DATA: 18
    • T.CONFID-JCS-CODE: 6
    • T.CONFID-JCS-DATA: 11
    • T.INTEG-APPLI-CODE: 11
    • T.INTEG-APPLI-DATA: 21
    • T.INTEG-JCS-CODE: 6
    • T.INTEG-JCS-DATA: 12
    • T.SID: 18
    • T.EXE-CODE: 8
    • T.NATIVE: 6
    • T.RESOURCES: 8
    • T.DELETION: 6
    • T.INSTALL: 6
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 4
    • T.EXE-CODE-REMOTE: 3
    • T.INTEG-APPLI-: 5
    • T.INTEG-: 2
    • T.EXE-: 1
    • T.IC: 2
    • T.RND: 1
  • A:
    • A.IC: 2
    • A.DELETION: 3
    • A.APPLET: 5
    • A.VERIFICATION: 5
  • R:
    • R.JAVA: 9
  • OP:
    • OP.ARRAY_ACCESS: 9
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.FLOW: 3
    • OP.IMPORT_KEY: 2
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.JAVA: 5
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
    • OP.LOCAL_STACK_ACCESS: 3
    • OP.OPERAND_STACK_ACCE: 1
    • OP.PUT: 6
    • OP.RET_RORD: 1
    • OP.STATIC_FIELD: 3
    • OP.OPERAND_STACK_ACCESS: 2
  • OE:
    • OE.VERIFICATION: 38
    • OE.CODE-EVIDENCE: 19
    • OE.CARD_MANAGEMENT: 3
    • OE.SCP: 6
    • OE.APPLET: 8
    • OE.CODE-: 2
    • OE.CHECK-INIT: 1
  • OSP:
    • OSP.VERIFICATION: 5
  • T:
    • T.CONFID_APPLI_DATA: 3
    • T.RESSOURCES: 3
    • T.OBJ_DELETION: 3
    • T.PHYSICAL: 3
    • T.INTEG_APPLI_DATA: 6
  • A:
    • A.CGA: 4
    • A.SCA: 3
    • A.CSP: 4
    • A.PLT: 2
    • A.APPLET: 1
    • A.VERIFICATION: 1
  • OE:
    • OE.PLT: 2
    • OE.VERIFICATION: 4
    • OE.CODE_EVIDENCE: 2
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
  • OSP:
    • OSP.PLT: 1
    • OSP.VERIFICATION: 1
pdf_data/st_keywords/cc_claims/A
  • A.IC: 2
  • A.DELETION: 3
  • A.APPLET: 5
  • A.VERIFICATION: 5
  • A.CGA: 4
  • A.SCA: 3
  • A.CSP: 4
  • A.PLT: 2
  • A.APPLET: 1
  • A.VERIFICATION: 1
pdf_data/st_keywords/cc_claims/A/A.APPLET 5 1
pdf_data/st_keywords/cc_claims/A/A.VERIFICATION 5 1
pdf_data/st_keywords/cc_claims/OE
  • OE.VERIFICATION: 38
  • OE.CODE-EVIDENCE: 19
  • OE.CARD_MANAGEMENT: 3
  • OE.SCP: 6
  • OE.APPLET: 8
  • OE.CODE-: 2
  • OE.CHECK-INIT: 1
  • OE.PLT: 2
  • OE.VERIFICATION: 4
  • OE.CODE_EVIDENCE: 2
  • OE.APPLET: 1
  • OE.CODE-EVIDENCE: 1
pdf_data/st_keywords/cc_claims/OE/OE.APPLET 8 1
pdf_data/st_keywords/cc_claims/OE/OE.CODE-EVIDENCE 19 1
pdf_data/st_keywords/cc_claims/OE/OE.VERIFICATION 38 4
pdf_data/st_keywords/cc_claims/OSP
  • OSP.VERIFICATION: 5
  • OSP.PLT: 1
  • OSP.VERIFICATION: 1
pdf_data/st_keywords/cc_claims/OSP/OSP.VERIFICATION 5 1
pdf_data/st_keywords/cc_claims/T
  • T.CONFIGURATION: 5
  • T.CONF_DATA_APPLET: 5
  • T.PATCH_LOADING: 5
  • T.CONFID-APPLI-DATA: 18
  • T.CONFID-JCS-CODE: 6
  • T.CONFID-JCS-DATA: 11
  • T.INTEG-APPLI-CODE: 11
  • T.INTEG-APPLI-DATA: 21
  • T.INTEG-JCS-CODE: 6
  • T.INTEG-JCS-DATA: 12
  • T.SID: 18
  • T.EXE-CODE: 8
  • T.NATIVE: 6
  • T.RESOURCES: 8
  • T.DELETION: 6
  • T.INSTALL: 6
  • T.OBJ-DELETION: 4
  • T.PHYSICAL: 4
  • T.EXE-CODE-REMOTE: 3
  • T.INTEG-APPLI-: 5
  • T.INTEG-: 2
  • T.EXE-: 1
  • T.IC: 2
  • T.RND: 1
  • T.CONFID_APPLI_DATA: 3
  • T.RESSOURCES: 3
  • T.OBJ_DELETION: 3
  • T.PHYSICAL: 3
  • T.INTEG_APPLI_DATA: 6
pdf_data/st_keywords/cc_claims/T/T.PHYSICAL 4 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
  • ANSSI:
    • ANSSI-CC-PP-2010/03_M01: 1
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075: 1
    • BSI-CC-PP-0071: 1
    • BSI-CC-PP-0072: 1
    • BSI-CC-PP-0076: 1
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084-2014: 1
  • BSI-CC-PP-0084-2014: 1
  • BSI-CC-PP-0059-2009-MA-01: 1
  • BSI-CC-PP-0075: 1
  • BSI-CC-PP-0071: 1
  • BSI-CC-PP-0072: 1
  • BSI-CC-PP-0076: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 6
  • ADV_FSP.1: 4
  • ADV_TDS.1: 2
  • ADV_FSP.5: 8
  • ADV_TDS.4: 8
  • ADV_IMP.1: 9
  • ADV_TDS.3: 4
  • ADV_FSP.2: 2
  • ADV_FSP.4: 1
  • ADV_IMP: 1
  • ADV_ARC: 1
  • ADV_COMP: 1
  • ADV_ARC: 1
  • ADV_FSP: 1
  • ADV_IMP: 1
  • ADV_INT: 1
  • ADV_TDS: 1
  • ADV_ARC.1: 2
  • ADV_TDS.3: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 6 2
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.3 4 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_PRE: 12
  • AGD_OPE: 2
  • AGD_OPE.1: 10
  • AGD_PRE.1: 6
  • AGD_PRE: 14
  • AGD_OPE: 11
  • AGD_PRE_PLT: 2
  • AGD_OPE.1: 2
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE 2 11
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 10 2
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE 12 14
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 20
  • ALC_DVS: 1
  • ALC_TAT.1: 2
  • ALC_TAT.2: 3
  • ALC_CMC.4: 1
  • ALC_CMS.1: 1
  • ALC_DVS.1: 2
  • ALC_LCD.1: 3
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.2: 7
  • ALC_DVS: 2
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_LCD: 1
  • ALC_TAT: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS 1 2
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 20 7
pdf_data/st_keywords/cc_sar/ASE
  • ASE_TSS.2: 6
  • ASE_CCL.1: 1
  • ASE_ECD.1: 4
  • ASE_INT.1: 5
  • ASE_REQ.1: 2
  • ASE_REQ.2: 2
  • ASE_OBJ.2: 3
  • ASE_SPD.1: 2
  • ASE_TSS.1: 1
  • ASE_CCL: 1
  • ASE_ECD: 1
  • ASE_INT: 1
  • ASE_TSS: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 3
  • ATE_FUN.1: 6
  • ATE_COV.1: 2
  • ATE_DPT.1: 1
  • ATE_DPT.3: 1
  • ATE_COV: 1
  • ATE_DPT: 1
  • ATE_FUN: 1
  • ATE_IND: 1
  • ATE_DPT.1: 2
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.1 1 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN 9 2
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 21 8
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 4
  • EAL5: 11
  • EAL 5+: 3
  • EAL5 augmented: 1
  • EAL5: 6
  • EAL 5: 2
  • EAL4: 1
  • EAL5 augmented: 2
  • EAL4 augmented: 1
  • EAL 5 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 11 6
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 1 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_STG.2: 10
    • FAU_ARP.1: 24
    • FAU_ARP.1.1: 1
    • FAU_STG.2.1: 1
    • FAU_STG.2.2: 1
    • FAU_STG.2.3: 1
    • FAU_SAA.1: 3
    • FAU_GEN.1: 2
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 19
    • FCO_NRO.2: 8
  • FCS:
    • FCS_RNG: 14
    • FCS_RNG.1: 7
    • FCS_COP: 29
    • FCS_CKM: 23
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
    • FCS_CKM.1: 24
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 12
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 9
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 23
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 32
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 88
    • FDP_ACF: 73
    • FDP_UCT: 16
    • FDP_ITC: 31
    • FDP_UIT: 19
    • FDP_ACC.2: 13
    • FDP_ACF.1: 34
    • FDP_IFC: 31
    • FDP_IFC.1: 22
    • FDP_IFF: 24
    • FDP_IFF.1: 16
    • FDP_RIP: 151
    • FDP_RIP.1: 10
    • FDP_ROL.1: 5
    • FDP_ROL: 17
    • FDP_SDI.2: 13
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_ITC.2: 16
    • FDP_IFC.2: 2
    • FDP_UIT.1: 4
    • FDP_UCT.1: 1
    • FDP_ITC.1: 10
    • FDP_ACC.1: 24
    • FDP_SDC.1: 1
    • FDP_ITT.1: 1
  • FIA:
    • FIA_AFL: 49
    • FIA_UAU: 67
    • FIA_UID: 38
    • FIA_ATD: 20
    • FIA_ATD.1: 3
    • FIA_UID.2: 1
    • FIA_USB: 10
    • FIA_USB.1: 3
    • FIA_UID.1: 16
    • FIA_AFL.1: 10
    • FIA_UAU.1: 11
    • FIA_UAU.4: 2
    • FIA_UAU.7: 2
  • FMT:
    • FMT_SMR: 69
    • FMT_MSA: 224
    • FMT_SMF: 73
    • FMT_MOF: 12
    • FMT_MTD: 51
    • FMT_MSA.1: 20
    • FMT_MSA.2: 5
    • FMT_MSA.3: 27
    • FMT_SMF.1: 31
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 57
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MTD.1: 5
    • FMT_MTD.3: 1
    • FMT_SMR.2: 6
    • FMT_MOF.1: 1
    • FMT_MTD.2: 2
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
  • FPR:
    • FPR_UNO: 29
    • FPR_UNO.1: 17
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_TST.1: 13
    • FPT_TDC: 9
    • FPT_PHP: 9
    • FPT_FLS: 57
    • FPT_RCV: 39
    • FPT_FLS.1: 23
    • FPT_FLS.1.1: 2
    • FPT_TDC.1: 12
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_RCV.3: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3: 3
    • FPT_RCV.4: 1
    • FPT_ITT.1: 1
  • FRU:
    • FRU_FLT: 10
    • FRU_FLT.1: 1
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 28
    • FTP_ITC.1: 10
    • FTP_TRP.1: 4
  • FAU:
    • FAU_GEN: 1
    • FAU_ARP.1: 2
  • FCS:
    • FCS_RNG: 4
    • FCS_CKM.1: 41
    • FCS_CKM: 34
    • FCS_COP: 104
    • FCS_RNG.1: 19
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.2: 8
    • FCS_COP.1: 38
    • FCS_CKM.4: 60
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 3
    • FCS_CKM.3: 7
  • FDP:
    • FDP_ACC: 70
    • FDP_ACF: 49
    • FDP_ETC: 5
    • FDP_ITC: 21
    • FDP_ITC.1: 42
    • FDP_ITC.2: 35
    • FDP_ACF.1: 36
    • FDP_ACC.1: 40
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 3
    • FDP_SDI: 15
    • FDP_SDI.1: 2
    • FDP_SDI.2: 6
    • FDP_IFC.1: 22
    • FDP_UCT: 7
    • FDP_UCT.1: 1
    • FDP_DAU: 6
    • FDP_DAU.1: 1
    • FDP_DAU.2: 2
    • FDP_UIT: 5
    • FDP_UIT.1: 2
    • FDP_ETC.1: 2
    • FDP_CKM: 4
    • FDP_CKM.1: 1
    • FDP_RIP: 11
    • FDP_ROL: 1
  • FIA:
    • FIA_API: 5
    • FIA_API.1: 9
    • FIA_UID.1: 17
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UAU.1: 16
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_API.1.1: 1
    • FIA_AFL.1: 3
    • FIA_AFL: 22
    • FIA_AFL.1.1: 1
  • FMT:
    • FMT_MSA: 30
    • FMT_MTD: 40
    • FMT_MSA.3: 30
    • FMT_SMR.1: 42
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1: 44
    • FMT_SMF.1.1: 1
    • FMT_MSA.1: 7
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 8
    • FMT_MSA.4.1: 1
    • FMT_MTD.1: 6
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
  • FPR:
    • FPR_UNO.1: 1
    • FPR_UNO: 3
  • FPT:
    • FPT_EMS: 7
    • FPT_EMS.1: 9
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 2
    • FPT_TST.1: 13
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_TST: 1
    • FPT_FLS: 6
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_RCV: 2
    • FPT_PHP: 2
  • FTP:
    • FTP_ITC.1: 16
    • FTP_TRP.1: 4
    • FTP_ITC: 31
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_STG.2: 10
  • FAU_ARP.1: 24
  • FAU_ARP.1.1: 1
  • FAU_STG.2.1: 1
  • FAU_STG.2.2: 1
  • FAU_STG.2.3: 1
  • FAU_SAA.1: 3
  • FAU_GEN.1: 2
  • FAU_SAS.1: 1
  • FAU_GEN: 1
  • FAU_ARP.1: 2
pdf_data/st_keywords/cc_sfr/FAU/FAU_ARP.1 24 2
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RNG: 14
  • FCS_RNG.1: 7
  • FCS_COP: 29
  • FCS_CKM: 23
  • FCS_RNG.1.1: 1
  • FCS_RNG.1.2: 1
  • FCS_CKM.1: 24
  • FCS_CKM.1.1: 1
  • FCS_CKM.2: 12
  • FCS_CKM.2.1: 1
  • FCS_CKM.3: 9
  • FCS_CKM.3.1: 1
  • FCS_CKM.4: 23
  • FCS_CKM.4.1: 1
  • FCS_COP.1: 32
  • FCS_COP.1.1: 1
  • FCS_RNG: 4
  • FCS_CKM.1: 41
  • FCS_CKM: 34
  • FCS_COP: 104
  • FCS_RNG.1: 19
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.2: 8
  • FCS_COP.1: 38
  • FCS_CKM.4: 60
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 3
  • FCS_CKM.3: 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 23 34
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 24 41
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 12 8
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.3 9 7
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 23 60
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 29 104
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 32 38
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 1 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 14 4
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 7 19
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 1 3
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 1 3
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC: 88
  • FDP_ACF: 73
  • FDP_UCT: 16
  • FDP_ITC: 31
  • FDP_UIT: 19
  • FDP_ACC.2: 13
  • FDP_ACF.1: 34
  • FDP_IFC: 31
  • FDP_IFC.1: 22
  • FDP_IFF: 24
  • FDP_IFF.1: 16
  • FDP_RIP: 151
  • FDP_RIP.1: 10
  • FDP_ROL.1: 5
  • FDP_ROL: 17
  • FDP_SDI.2: 13
  • FDP_SDI.2.1: 1
  • FDP_SDI.2.2: 1
  • FDP_ITC.2: 16
  • FDP_IFC.2: 2
  • FDP_UIT.1: 4
  • FDP_UCT.1: 1
  • FDP_ITC.1: 10
  • FDP_ACC.1: 24
  • FDP_SDC.1: 1
  • FDP_ITT.1: 1
  • FDP_ACC: 70
  • FDP_ACF: 49
  • FDP_ETC: 5
  • FDP_ITC: 21
  • FDP_ITC.1: 42
  • FDP_ITC.2: 35
  • FDP_ACF.1: 36
  • FDP_ACC.1: 40
  • FDP_RIP.1: 10
  • FDP_RIP.1.1: 3
  • FDP_SDI: 15
  • FDP_SDI.1: 2
  • FDP_SDI.2: 6
  • FDP_IFC.1: 22
  • FDP_UCT: 7
  • FDP_UCT.1: 1
  • FDP_DAU: 6
  • FDP_DAU.1: 1
  • FDP_DAU.2: 2
  • FDP_UIT: 5
  • FDP_UIT.1: 2
  • FDP_ETC.1: 2
  • FDP_CKM: 4
  • FDP_CKM.1: 1
  • FDP_RIP: 11
  • FDP_ROL: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 88 70
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 24 40
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 73 49
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 34 36
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 31 21
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 10 42
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 16 35
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 151 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_ROL 17 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI.2 13 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT 16 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 19 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 4 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL: 49
  • FIA_UAU: 67
  • FIA_UID: 38
  • FIA_ATD: 20
  • FIA_ATD.1: 3
  • FIA_UID.2: 1
  • FIA_USB: 10
  • FIA_USB.1: 3
  • FIA_UID.1: 16
  • FIA_AFL.1: 10
  • FIA_UAU.1: 11
  • FIA_UAU.4: 2
  • FIA_UAU.7: 2
  • FIA_API: 5
  • FIA_API.1: 9
  • FIA_UID.1: 17
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UAU.1: 16
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_API.1.1: 1
  • FIA_AFL.1: 3
  • FIA_AFL: 22
  • FIA_AFL.1.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 49 22
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 10 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 11 16
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 16 17
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMR: 69
  • FMT_MSA: 224
  • FMT_SMF: 73
  • FMT_MOF: 12
  • FMT_MTD: 51
  • FMT_MSA.1: 20
  • FMT_MSA.2: 5
  • FMT_MSA.3: 27
  • FMT_SMF.1: 31
  • FMT_SMF.1.1: 1
  • FMT_SMR.1: 57
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 5
  • FMT_MTD.3: 1
  • FMT_SMR.2: 6
  • FMT_MOF.1: 1
  • FMT_MTD.2: 2
  • FMT_LIM.1: 1
  • FMT_LIM.2: 1
  • FMT_MSA: 30
  • FMT_MTD: 40
  • FMT_MSA.3: 30
  • FMT_SMR.1: 42
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 44
  • FMT_SMF.1.1: 1
  • FMT_MSA.1: 7
  • FMT_MSA.2: 9
  • FMT_MSA.2.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.4: 8
  • FMT_MSA.4.1: 1
  • FMT_MTD.1: 6
  • FMT_MOF.1: 7
  • FMT_MOF.1.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 1 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 224 30
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 20 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 5 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 27 30
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 51 40
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 5 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 31 44
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 57 42
pdf_data/st_keywords/cc_sfr/FPR
  • FPR_UNO: 29
  • FPR_UNO.1: 17
  • FPR_UNO.1.1: 1
  • FPR_UNO.1: 1
  • FPR_UNO: 3
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO 29 3
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 17 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_TST.1: 13
  • FPT_TDC: 9
  • FPT_PHP: 9
  • FPT_FLS: 57
  • FPT_RCV: 39
  • FPT_FLS.1: 23
  • FPT_FLS.1.1: 2
  • FPT_TDC.1: 12
  • FPT_TDC.1.1: 1
  • FPT_TDC.1.2: 1
  • FPT_RCV.3: 11
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3: 3
  • FPT_RCV.4: 1
  • FPT_ITT.1: 1
  • FPT_EMS: 7
  • FPT_EMS.1: 9
  • FPT_EMS.1.1: 4
  • FPT_EMS.1.2: 2
  • FPT_TST.1: 13
  • FPT_FLS.1: 10
  • FPT_FLS.1.1: 1
  • FPT_TST: 1
  • FPT_FLS: 6
  • FPT_PHP.1: 5
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 7
  • FPT_PHP.3.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_RCV: 2
  • FPT_PHP: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS 57 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 23 10
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 2 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP 9 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 3 7
pdf_data/st_keywords/cc_sfr/FPT/FPT_RCV 39 2
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 28 31
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 10 16
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 3
  • CBC:
    • CBC: 10
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KA:
    • Key Agreement: 3
    • Key agreement: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_scheme/MAC/MAC 2 8
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 5
    • SHA1: 1
  • SHA2:
    • SHA-224: 4
    • SHA-384: 4
    • SHA-256: 4
    • SHA-512: 3
  • SHA3:
    • SHA3-224: 2
    • SHA3-256: 2
    • SHA3-384: 2
    • SHA3-512: 2
    • SHA-3: 3
    • SHA3: 4
  • SHA1:
    • SHA-1: 8
  • SHA2:
    • SHA-256: 5
    • SHA-224: 2
    • SHA-384: 2
pdf_data/st_keywords/hash_function/SHA/SHA1
  • SHA-1: 5
  • SHA1: 1
  • SHA-1: 8
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 5 8
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 4
  • SHA-384: 4
  • SHA-256: 4
  • SHA-512: 3
  • SHA-256: 5
  • SHA-224: 2
  • SHA-384: 2
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 4 2
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 4 5
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 4 2
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 2
  • javacard:
    • javacard.security: 4
    • javacard.crypto: 1
    • javacard.framework: 4
  • javacardx:
    • javacardx.biometry: 1
    • javacardx.crypto: 2
    • javacardx.security: 1
    • javacardx.framework.util: 1
  • com:
    • com.oberthurcs.javacard: 3
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.4: 4
  • GlobalPlatform:
    • Global Platform 2.2.1: 2
pdf_data/st_keywords/randomness/RNG
  • RNG: 16
  • RND: 2
  • RNG: 6
pdf_data/st_keywords/randomness/RNG/RNG 16 6
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 2
    • physical probing: 4
    • DPA: 2
    • SPA: 1
  • FI:
    • physical tampering: 2
    • malfunction: 2
    • Malfunction: 2
    • fault injection: 1
  • SCA:
    • side channel: 1
    • SPA: 1
    • DPA: 1
    • timing attacks: 1
  • FI:
    • physical tampering: 5
    • DFA: 2
    • fault injection: 2
  • other:
    • JIL: 1
    • JIL-COMP: 2
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 2
  • malfunction: 2
  • Malfunction: 2
  • fault injection: 1
  • physical tampering: 5
  • DFA: 2
  • fault injection: 2
pdf_data/st_keywords/side_channel_analysis/FI/fault injection 1 2
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 2 5
pdf_data/st_keywords/side_channel_analysis/SCA
  • Leak-Inherent: 2
  • physical probing: 4
  • DPA: 2
  • SPA: 1
  • side channel: 1
  • SPA: 1
  • DPA: 1
  • timing attacks: 1
pdf_data/st_keywords/side_channel_analysis/SCA/DPA 2 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 46-3: 4
    • FIPS PUB 81: 6
    • FIPS PUB 197: 5
    • FIPS PUB 180-3: 2
    • FIPS PUB 202: 3
    • FIPS 140-2: 1
    • FIPS PUB 186-3: 1
  • NIST:
    • NIST SP 800-90: 2
  • PKCS:
    • PKCS#1: 3
  • BSI:
    • AIS31: 1
  • ISO:
    • ISO/IEC 7816: 2
    • ISO/IEC 14443: 2
    • ISO/IEC 9797: 8
    • ISO/IEC 9796-: 1
    • ISO/IEC 7816-6: 1
    • ISO/IEC 9796-1: 1
    • ISO/IEC 9797-1: 1
  • SCP:
    • SCP02: 4
    • SCP03: 5
  • FIPS:
    • FIPS180-3: 1
    • FIPS PUB 180-3: 1
    • FIPS 180-3: 1
  • PKCS:
    • PKCS#1: 3
    • PKCS #1: 1
    • PKCS#3: 3
    • PKCS#15: 2
  • ISO:
    • ISO/IEC 9796-2: 4
  • SCP:
    • SCP03: 7
    • SCP02: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS PUB 46-3: 4
  • FIPS PUB 81: 6
  • FIPS PUB 197: 5
  • FIPS PUB 180-3: 2
  • FIPS PUB 202: 3
  • FIPS 140-2: 1
  • FIPS PUB 186-3: 1
  • FIPS180-3: 1
  • FIPS PUB 180-3: 1
  • FIPS 180-3: 1
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-3 2 1
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 7816: 2
  • ISO/IEC 14443: 2
  • ISO/IEC 9797: 8
  • ISO/IEC 9796-: 1
  • ISO/IEC 7816-6: 1
  • ISO/IEC 9796-1: 1
  • ISO/IEC 9797-1: 1
  • ISO/IEC 9796-2: 4
pdf_data/st_keywords/standard_id/PKCS
  • PKCS#1: 3
  • PKCS#1: 3
  • PKCS #1: 1
  • PKCS#3: 3
  • PKCS#15: 2
pdf_data/st_keywords/standard_id/SCP/SCP02 4 2
pdf_data/st_keywords/standard_id/SCP/SCP03 5 7
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 26 17
pdf_data/st_keywords/symmetric_crypto/DES/3DES
  • TDES: 15
  • Triple-DES: 1
  • TDES: 3
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 15 3
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 18 10
pdf_data/st_keywords/symmetric_crypto/constructions/MAC
  • HMAC: 2
  • CMAC: 1
  • CMAC: 3
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC 1 3
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 20
  • Oberthur:
    • Oberthur Technologies: 35
    • Oberthur: 13
  • NXP:
    • NXP: 4
  • Oberthur:
    • Oberthur Technologies: 1
  • Idemia:
    • IDEMIA: 19
  • Morpho:
    • Morpho: 1
pdf_data/st_keywords/vendor/NXP/NXP 20 4
pdf_data/st_keywords/vendor/Oberthur
  • Oberthur Technologies: 35
  • Oberthur: 13
  • Oberthur Technologies: 1
pdf_data/st_keywords/vendor/Oberthur/Oberthur Technologies 35 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 3563890
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 228
  • /CreationDate: D:20170816182749+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20170911161447+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject:
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 2888609
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
  • /Author: IDEMIA
  • /CreationDate: D:20200421132115+05'30'
  • /Creator: Microsoft® Word 2016
  • /Keywords: Quality
  • /ModDate: D:20200421211611+05'30'
  • /Producer: Microsoft® Word 2016
  • /Subject: FQR standard
  • pdf_hyperlinks: ftp://ftp.itc.1/SVD, ftp://ftp.itc.1/SCD
pdf_data/st_metadata//CreationDate D:20170816182749+02'00' D:20200421132115+05'30'
pdf_data/st_metadata//Creator Microsoft® Office Word 2007 Microsoft® Word 2016
pdf_data/st_metadata//ModDate D:20170911161447+02'00' D:20200421211611+05'30'
pdf_data/st_metadata//Producer Microsoft® Office Word 2007 Microsoft® Word 2016
pdf_data/st_metadata//Subject FQR standard
pdf_data/st_metadata/pdf_file_size_bytes 3563890 2888609
pdf_data/st_metadata/pdf_hyperlinks ftp://ftp.itc.1/SVD, ftp://ftp.itc.1/SCD
pdf_data/st_metadata/pdf_number_of_pages 228 93
dgst 50b21dc8c7fc5430 827c72610e519994