name |
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) |
ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
29.09.2028 |
09.02.2029 |
not_valid_before |
29.09.2023 |
09.02.2024 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_42fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2023_12-R01fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_42fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_12-R01fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_42en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2023_12-R01en.pdf |
manufacturer |
THALES DIS FRANCE SA |
NXP Semiconductors Germany GmbH |
manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.nxp.com |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
5f61ebf23c6ad99d |
6ee673a8fd9cbf07 |
heuristics/cert_id |
ANSSI-CC-2023/42 |
ANSSI-CC-2023/12-R01 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.2, AVA_VAN.5 |
ALC_CMS.5, ASE_INT.1, ASE_ECD.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2 |
heuristics/extracted_versions |
5.1, 3.1, 5.2.1 |
4.0.1.52, 4.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
BSI-DSZ-CC-1149-V2-2023, NSCIB-CC-0313985-CR |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
BSI-DSZ-CC-1149-2022, BSI-DSZ-CC-1149-V2-2023, NSCIB-CC-0313985-CR |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/42
- description: Le produit évalué est l’application « IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1, Versions 5.2.1.A.C et 5.2.1.A.O » développée par THALES DIS FRANCE SAS et embarquée sur le microcontrôleur AQUARIUS_BA_09 fabriqué par THALES DIS. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD).
- developer: THALES DIS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/42
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_42fr.pdf
- certification_date: 22.09.2023
- developer: THALES DIS
- evaluation_facility: CEA - LETI
- expiration_date: 22.09.2028
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4: Extension for device with key generation and trusted channel to certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part5: Extension for device with key generation and trusted communication with signature-creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6: Extension for device with key import and trusted channel to signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
- sponsor: THALES DIS
- expiration_date: 22.09.2028
- level: EAL5+
- product: IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 (Versions 5.2.1.A.C et 5.2.1.A.O)
- sponsor: THALES DIS
- url: https://cyber.gouv.fr/produits-certifies/ias-classic-v521-moc-server-v31-multiapp-v51-versions-521ac-et-521ao
|
- cert_id: ANSSI-CC-2023/12-R01
- description: Le produit évalué est « ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration, Version 4.0.1.52 » développé par NXP SEMICONDUCTORS. Ce produit offre des services d’authentification et de signature électronique (SSCD).
- developer: NXP SEMICONDUCTORS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/12-R01
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-2023_12-R01fr.pdf
- certification_date: 09.02.2024
- developer: NXP SEMICONDUCTORS
- evaluation_facility: THALES / CNES
- expiration_date: 09.02.2029
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection profiles for secure signature creation device Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-02 Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_12-R01fr.pdf
- sponsor: NXP SEMICONDUCTORS
- target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2023_12-R01en.pdf
- expiration_date: 09.02.2029
- level: EAL5+
- product: ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52)
- sponsor: NXP SEMICONDUCTORS
- url: https://cyber.gouv.fr/produits-certifies/chipdoc-v4-jcop-45-p71-sscd-configuration-version-40152
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1149-V2-2023 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1149-V2-2023 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2023_42fr.pdf |
certificat-2023_12-R01fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230929173949+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20230929174206+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 158885
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20240214225528+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20240214231041+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 165401
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
ANSSI-CC-2023_42fr.pdf |
ANSSI-CC-2023_12-R01fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2023/01: 2
- ANSSI-CC-2023/31: 3
- ANSSI-CC-2023/42: 2
|
- DE:
- BSI-DSZ-CC-1149-V2-2023: 1
- FR:
- NL:
- NSCIB-CC-0313985-1MA2: 1
- NSCIB-CC-0313985-CR: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075-2012-MA-01: 2
- BSI-CC-PP-0076-2013-MA-01: 2
- other:
- PP-SSCD-: 1
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075-2012-MA-01: 2
- BSI-CC-PP-0076-2013-MA-01: 2
- other:
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 2
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 5
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
ANSSI-cible-2023_42en.pdf |
ANSSI-Cible-CC-2023_12-R01en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1149-V2-2023: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0099-V2-2020: 1
- other:
- PP-SSCD: 4
- PP-SSCD-KG: 37
- PP-SSCD-KI: 28
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0086: 1
- BSI-CC-PP-0087-V2-MA-01: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 1
- EAL5: 3
- EAL5 augmented: 1
- EAL5+: 1
|
- EAL:
- EAL5: 8
- EAL5 augmented: 4
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.4: 1
- ADV_FSP.5: 6
- ADV_IMP.1: 5
- ADV_INT.2: 2
- ADV_TDS.3: 1
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 4
- ASE_OBJ.2: 3
- ASE_REQ.2: 4
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCO:
- FCS:
- FCS_CKM: 59
- FCS_CKM.1: 10
- FCS_CKM.1.1: 2
- FCS_CKM.2: 3
- FCS_CKM.3: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 2
- FCS_COP: 35
- FCS_COP.1: 6
- FCS_COP.1.1: 2
- FCS_RNG: 1
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 55
- FDP_ACC.1: 27
- FDP_ACC.1.1: 4
- FDP_ACF: 43
- FDP_ACF.1: 9
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_AFC: 1
- FDP_DAU: 11
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_IFC: 2
- FDP_IFC.1: 9
- FDP_IFF: 2
- FDP_ITC: 11
- FDP_ITC.1: 9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.2: 8
- FDP_RIP: 6
- FDP_RIP.1: 17
- FDP_RIP.1.1: 1
- FDP_SDI: 22
- FDP_SDI.1: 2
- FDP_SDI.2: 4
- FDP_UCT: 11
- FDP_UCT.1: 1
- FDP_UIT: 10
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 20
- FIA_AFL.1: 4
- FIA_API: 5
- FIA_API.1: 14
- FIA_API.1.1: 2
- FIA_ATD: 2
- FIA_UAU: 28
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 25
- FIA_UID.1: 14
- FIA_USB: 1
- FMT:
- FMT_LIM: 2
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 80
- FMT_MSA.1: 10
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 15
- FMT_MSA.4: 3
- FMT_MTD: 25
- FMT_MTD.1: 3
- FMT_SMF: 6
- FMT_SMF.1: 27
- FMT_SMF.1.1: 1
- FMT_SMR: 7
- FMT_SMR.1: 36
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 14
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS: 6
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_RCV: 2
- FPT_TST: 2
- FPT_TST.1: 14
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 42
- FTP_ITC.1: 16
- FTP_TRP: 1
- FTP_TRP.1: 4
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 11
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 52
- FCS_CKM.1: 3
- FCS_CKM.4: 2
- FCS_COP: 58
- FCS_COP.1: 2
- FCS_RND: 5
- FCS_RND.1: 17
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 22
- FDP_ACC.1: 5
- FDP_ACF: 22
- FDP_ACF.1: 22
- FDP_DAU: 3
- FDP_DAU.2: 2
- FDP_ITC: 2
- FDP_ITC.1: 3
- FDP_RIP: 28
- FDP_RIP.1: 4
- FDP_SDC: 10
- FDP_SDC.1: 6
- FDP_SDC.1.1: 1
- FDP_SDI: 5
- FDP_SDI.2: 4
- FDP_UCT: 11
- FDP_UCT.1: 2
- FDP_UIT: 9
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 34
- FIA_AFL.1: 5
- FIA_API: 24
- FIA_API.1: 3
- FIA_SOS.2: 1
- FIA_UAU: 96
- FIA_UAU.1: 14
- FIA_UAU.1.1: 1
- FIA_UAU.4: 2
- FIA_UAU.5: 2
- FIA_UAU.6: 1
- FIA_UID: 39
- FIA_UID.1: 6
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 12
- FMT_LIM.1.1: 2
- FMT_LIM.2: 11
- FMT_LIM.2.1: 2
- FMT_MOF: 7
- FMT_MOF.1: 3
- FMT_MSA: 18
- FMT_MSA.1: 4
- FMT_MSA.2: 1
- FMT_MSA.3: 9
- FMT_MSA.4: 2
- FMT_MTD: 98
- FMT_MTD.1: 6
- FMT_MTD.3: 9
- FMT_MTD.3.1: 1
- FMT_SMF: 22
- FMT_SMF.1: 3
- FMT_SMR: 20
- FMT_SMR.1: 4
- FPT:
- FPT_EMS: 12
- FPT_EMS.1: 5
- FPT_FLS: 11
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_LIM: 1
- FPT_LIM.1: 1
- FPT_LIM.2: 1
- FPT_PHP: 7
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FPT_TST: 8
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.C: 5
- A.CAP_FILE: 4
- A.CGA: 3
- A.CSP: 3
- A.O: 5
- A.SCA: 3
- A.VERIFICATION: 4
- O:
- O.ALARM: 1
- O.ARRAY_VIEWS_CONFID: 1
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 1
- O.CONFID-OS-UPDATE: 2
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.INSTALL: 1
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.RNG: 1
- O.SCP: 3
- O.SECURE_AC_ACTIVATION: 2
- O.SECURE_LOAD_ACODE: 2
- O.SID: 1
- O.TOE_IDENTIFICATION: 1
- O.TRANSACTION: 1
- OE:
- OE.CAP_FILE: 5
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 5
- OE.HID_VAD: 3
- OE.PERSONALISATION: 2
- OE.PROT_LOGICAL_DATA: 1
- OE.SCP: 2
- OE.TERMINAL: 2
- OE.USER_OBLIGATIONS: 1
- OE.VERIFICATION: 7
|
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 122
- NXP Semiconductors: 38
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 5
- SHA-384: 4
- SHA-512: 5
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- fault induction: 1
- fault injection: 1
- physical tampering: 4
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
- FI:
- Malfunction: 4
- Physical Tampering: 3
- malfunction: 9
- physical tampering: 5
- SCA:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.ChipSecurity: 1
- EF.DG1: 3
- EF.DG14: 2
- EF.DG16: 3
- EF.DG3: 6
- EF.DG4: 6
- EF.SOD: 1
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-04-003: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-004: 1
- FIPS:
- ICAO:
- PKCS:
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 2
- FIPS 197: 5
- FIPS 46-3: 4
- FIPS PUB 46-3: 1
- FIPS180-4: 1
- ICAO:
- ISO:
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- by authorized users. The functionalities of IAS Classic 5.2.1 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1.1 application) provides biometry recognition with: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Emmanuel BACHIMON
- /CreationDate: D:20230504155302+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20230504155302+02'00'
- /Producer: Microsoft® Word 2016
- /Title: IAS Classic v5.2 on MultiApp V5.1- Security Target
- pdf_file_size_bytes: 2282348
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
- /Author: NXP B.V.
- /CreationDate: D:20231010235706+02'00'
- /Creator: DITA Open Toolkit 3.3.1
- /Keywords: Common Criteria, Security Target Lite, ChipDoc v4, SSCD
- /Producer: Apache FOP Version 2.3
- /Subject: ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration
- /Title: Security Target Lite
- pdf_file_size_bytes: 929958
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 103
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |