Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 )
ANSSI-CC-2023/42
Microcontrôleur sécurisé ST31-K330A révisionH pour version bi-mode (contact et sanscontact) ou version sans contact seulement,incluant optionnellement la librairiecryptographique Neslib v3.2, la librairieMIFARE DESFireTM EV1 v2.2 et la librairieMIFARE Plus-STM v1.3
ANSSI-CC-2014/94
name Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) Microcontrôleur sécurisé ST31-K330A révisionH pour version bi-mode (contact et sanscontact) ou version sans contact seulement,incluant optionnellement la librairiecryptographique Neslib v3.2, la librairieMIFARE DESFireTM EV1 v2.2 et la librairieMIFARE Plus-STM v1.3
status active archived
not_valid_after 29.09.2028 05.10.2023
not_valid_before 29.09.2023 05.01.2015
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_42fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2014_94-S04.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_42fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2014-94_EN.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_42en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2014_94_LITE.pdf
manufacturer THALES DIS FRANCE SA STMicroelectronics
manufacturer_web https://www.thalesgroup.com/en/europe/france https://www.st.com/
security_level AVA_VAN.5, ALC_DVS.2, EAL5+ AVA_VAN.5, ALC_DVS.2, ASE_TSS.2, EAL5+
dgst 5f61ebf23c6ad99d 7ae81a7a49041b5f
heuristics/cert_id ANSSI-CC-2023/42 ANSSI-CC-2014/94
heuristics/cert_lab [] SERMA
heuristics/extracted_sars ALC_DVS.2, AVA_VAN.5 ALC_CMS.5, ASE_INT.1, ASE_ECD.1, ATE_FUN.1, ADV_IMP.1, ASE_TSS.2, ATE_DPT.3, AGD_PRE.1, ASE_CCL.1, ALC_DVS.2, AVA_VAN.5, ASE_SPD.1, ASE_OBJ.2, ATE_COV.2, ALC_TAT.2, ASE_REQ.2, ADV_INT.2, ALC_CMC.4, ADV_FSP.5, ADV_ARC.1, ALC_DEL.1, AGD_OPE.1, ALC_LCD.1, ADV_TDS.4, ATE_IND.2
heuristics/extracted_versions 5.1, 3.1, 5.2.1 3.2, 1.3, 2.2
heuristics/report_references/directly_referencing ANSSI-CC-2023/01, ANSSI-CC-2023/31 ANSSI-CC-2013/66
heuristics/report_references/indirectly_referencing ANSSI-CC-2023/01, ANSSI-CC-2023/31 ANSSI-CC-2013/66
heuristics/scheme_data
  • cert_id: ANSSI-CC-2023/42
  • description: Le produit évalué est l’application « IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1, Versions 5.2.1.A.C et 5.2.1.A.O » développée par THALES DIS FRANCE SAS et embarquée sur le microcontrôleur AQUARIUS_BA_09 fabriqué par THALES DIS. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD).    
  • developer: THALES DIS
  • enhanced:
    • augmented: ALC_DVS.2, AVA_VAN.5
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • cert_id: ANSSI-CC-2023/42
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_42fr.pdf
    • certification_date: 22.09.2023
    • developer: THALES DIS
    • evaluation_facility: CEA - LETI
    • expiration_date: 22.09.2028
    • level: EAL5+
    • mutual_recognition: CCRA SOG-IS
    • protection_profile: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4: Extension for device with key generation and trusted channel to certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part5: Extension for device with key generation and trusted communication with signature-creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6: Extension for device with key import and trusted channel to signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
    • sponsor: THALES DIS
  • expiration_date: 22.09.2028
  • level: EAL5+
  • product: IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 (Versions 5.2.1.A.C et 5.2.1.A.O)
  • sponsor: THALES DIS
  • url: https://cyber.gouv.fr/produits-certifies/ias-classic-v521-moc-server-v31-multiapp-v51-versions-521ac-et-521ao
maintenance_updates

protection_profiles


pdf_data/cert_filename Certificat-CC-2023_42fr.pdf certificat ANSSI-CC-2014_94-S04.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/42: 2
  • FR:
    • ANSSI-CC-2014/94-S04: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
  • BSI:
    • BSI-PP-0035-2007: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
  • EAL:
    • EAL5: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ALC:
    • ALC_DVS.2: 1
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • A:
    • A.C: 1
    • A.O: 1
pdf_data/cert_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 2
pdf_data/cert_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 2
  • Serma:
    • Serma Safety & Security: 2
pdf_data/cert_metadata
  • /CreationDate: D:20230929173949+02'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20230929174206+02'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_file_size_bytes: 158885
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Author:
  • /CreationDate: D:20201222175639+01'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20201222175639+01'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 276352
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename ANSSI-CC-2023_42fr.pdf ANSSI-CC-2014-94_EN.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmented ALC_DVS.2, ASE_TSS.2, AVA_VAN.5
    • cc_version: Common Criteria version 3.1 revision 4
    • cert_id: ANSSI-CC-2014/94
    • cert_item: ST31-K330A Secure microcontroller revision H for Dual mode version (contact and contactless) or contactless only version, with optional NesLib cryptographic library v3.2, MIFARE® DESFire® EV1 library v2.2 and MIFARE Plus® -S library v1.3
    • cert_item_version: K330A maskset reference, internal revision H
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Sponsor STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France
    • match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
    • ref_protection_profiles: BSI_PP_0035-2007], version v1.0 Security IC Platform Protection Profile
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2023/01: 2
    • ANSSI-CC-2023/31: 3
    • ANSSI-CC-2023/42: 2
  • FR:
    • ANSSI-CC-2013/66: 1
    • ANSSI-CC-2014/94: 21
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0075-2012-MA-01: 2
    • BSI-CC-PP-0076-2013-MA-01: 2
  • other:
    • PP-SSCD-: 1
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
    • PP-SSCD-Part5: 2
    • PP-SSCD-Part6: 1
  • BSI:
    • BSI-PP-0035-2007: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 5 augmented: 2
    • EAL 7: 1
    • EAL4: 2
    • EAL5+: 1
    • EAL6: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 High: 1
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.C: 4
    • A.O: 4
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • STMicroelectronics:
    • STMicroelectronics: 19
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
  • Serma:
    • Serma Technologies: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/crypto_library
  • Neslib:
    • NesLib 3.2: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Physical tampering: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • BSI:
    • AIS 31: 1
    • AIS 34: 1
    • AIS31: 4
    • AIS34: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_metadata
  • /Author: renner
  • /CreationDate: D:20150223143731+01'00'
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate: D:20150223143731+01'00'
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title: ANSSI-CC-2014-94_EN
  • pdf_file_size_bytes: 1511442
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename ANSSI-cible-2023_42en.pdf anssi_cible_2014_94_LITE.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1: 2
    • CC-2: 2
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0099-V2-2020: 1
  • other:
    • PP-SSCD: 4
    • PP-SSCD-KG: 37
    • PP-SSCD-KI: 28
  • BSI:
    • BSI-PP- 0035: 1
    • BSI-PP-0035: 70
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 5+: 1
    • EAL5: 3
    • EAL5 augmented: 1
    • EAL5+: 1
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 2
    • EAL4: 1
    • EAL5: 17
pdf_data/st_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 2
    • ADV_FSP: 4
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 4
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 2
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 8
  • ATE:
    • ATE_COV: 3
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 59
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.3: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 2
    • FCS_COP: 35
    • FCS_COP.1: 6
    • FCS_COP.1.1: 2
    • FCS_RNG: 1
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 55
    • FDP_ACC.1: 27
    • FDP_ACC.1.1: 4
    • FDP_ACF: 43
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_AFC: 1
    • FDP_DAU: 11
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 9
    • FDP_IFF: 2
    • FDP_ITC: 11
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.2: 8
    • FDP_RIP: 6
    • FDP_RIP.1: 17
    • FDP_RIP.1.1: 1
    • FDP_SDI: 22
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 11
    • FDP_UCT.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 20
    • FIA_AFL.1: 4
    • FIA_API: 5
    • FIA_API.1: 14
    • FIA_API.1.1: 2
    • FIA_ATD: 2
    • FIA_UAU: 28
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 25
    • FIA_UID.1: 14
    • FIA_USB: 1
  • FMT:
    • FMT_LIM: 2
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 80
    • FMT_MSA.1: 10
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.4: 3
    • FMT_MTD: 25
    • FMT_MTD.1: 3
    • FMT_SMF: 6
    • FMT_SMF.1: 27
    • FMT_SMF.1.1: 1
    • FMT_SMR: 7
    • FMT_SMR.1: 36
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS: 6
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 1
    • FPT_RCV: 2
    • FPT_TST: 2
    • FPT_TST.1: 14
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 42
    • FTP_ITC.1: 16
    • FTP_TRP: 1
    • FTP_TRP.1: 4
  • FAU:
    • FAU_SAS: 1
    • FAU_SAS.1: 5
  • FCS:
    • FCS_CKM.1: 25
    • FCS_CKM.4: 20
    • FCS_COP.1: 34
    • FCS_RNG: 1
    • FCS_RNG.1: 7
  • FDP:
    • FDP_ACC.1: 40
    • FDP_ACC.2: 11
    • FDP_ACF.1: 43
    • FDP_CKM.2: 1
    • FDP_IFC.1: 14
    • FDP_ITC.1: 5
    • FDP_ITC.2: 22
    • FDP_ITT.1: 6
    • FDP_RIP.1: 16
    • FDP_ROL.1: 8
  • FIA:
    • FIA_UAU.2: 16
    • FIA_UAU.5: 17
    • FIA_UID.1: 4
    • FIA_UID.2: 20
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 7
    • FMT_LIM.2: 8
    • FMT_MSA.1: 31
    • FMT_MSA.3: 40
    • FMT_MTD.1: 16
    • FMT_SMF.1: 27
    • FMT_SMR.1: 28
  • FPR:
    • FPR_UNL.1: 16
  • FPT:
    • FPT_FLS.1: 10
    • FPT_ITT.1: 5
    • FPT_PHP.3: 6
    • FPT_RPL.1: 18
    • FPT_TDC.1: 18
    • FPT_TRP.1: 12
    • FPT_TST.1: 8
  • FRU:
    • FRU_FLT.2: 9
    • FRU_RSA.2: 16
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 10
    • FTP_TRP.1.3: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.C: 5
    • A.CAP_FILE: 4
    • A.CGA: 3
    • A.CSP: 3
    • A.O: 5
    • A.SCA: 3
    • A.VERIFICATION: 4
  • O:
    • O.ALARM: 1
    • O.ARRAY_VIEWS_CONFID: 1
    • O.CARD-MANAGEMENT: 1
    • O.CIPHER: 1
    • O.CONFID-OS-UPDATE: 2
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.RNG: 1
    • O.SCP: 3
    • O.SECURE_AC_ACTIVATION: 2
    • O.SECURE_LOAD_ACODE: 2
    • O.SID: 1
    • O.TOE_IDENTIFICATION: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.CAP_FILE: 5
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-EVIDENCE: 5
    • OE.HID_VAD: 3
    • OE.PERSONALISATION: 2
    • OE.PROT_LOGICAL_DATA: 1
    • OE.SCP: 2
    • OE.TERMINAL: 2
    • OE.USER_OBLIGATIONS: 1
    • OE.VERIFICATION: 7
  • O:
    • O.MAC-: 1
    • O.RND: 3
  • T:
    • T.RND: 3
pdf_data/st_keywords/vendor
  • Thales:
    • Thales: 75
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
  • STMicroelectronics:
    • STMicroelectronics: 9
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 4
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 38
      • AES-: 1
      • AES-128: 1
      • AES-192: 1
  • DES:
    • 3DES:
      • 3DES: 5
      • Triple-DES: 1
    • DES:
      • DES: 22
  • constructions:
    • MAC:
      • CBC-MAC: 3
      • CMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-224: 5
      • SHA-256: 5
      • SHA-384: 5
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
  • MAC:
    • MAC: 16
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 16
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 1
    • RNG: 3
  • RNG:
    • RND: 6
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 2
pdf_data/st_keywords/crypto_library
  • Neslib:
    • NESLIB 3.2: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • fault induction: 1
    • fault injection: 1
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
  • FI:
    • Malfunction: 9
    • malfunction: 6
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 8
    • Physical Probing: 4
    • physical probing: 3
    • side channel: 6
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-04-003: 1
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS197: 2
  • ICAO:
    • ICAO: 2
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 3
  • BSI:
    • AIS31: 4
    • BSI-AIS31: 3
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 9
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 140-2: 7
    • FIPS PUB 180-1: 4
    • FIPS PUB 180-2: 3
    • FIPS PUB 186: 2
    • FIPS PUB 197: 3
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 10116: 5
    • ISO/IEC 10118-: 2
    • ISO/IEC 14443: 2
    • ISO/IEC 14888: 2
    • ISO/IEC 7816-3: 1
    • ISO/IEC 9796: 1
    • ISO/IEC 9796-2: 4
    • ISO/IEC 9797: 1
    • ISO/IEC 9797-1: 3
  • PKCS:
    • PKCS #1: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • by authorized users. The functionalities of IAS Classic 5.2.1 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1.1 application) provides biometry recognition with: 1
    • out of scope: 1
  • OutOfScope:
    • 29 The Security IC Embedded Software (ES) is in User ROM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib MIFARE DESFire EV1, and MIFARE Plus S when they are embedded. 30: 1
    • ES) is in User ROM. The ES is not part of the TOE and is out of scope of the evaluation, except Neslib MIFARE DESFire EV1, and MIFARE Plus S when they are embedded: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Emmanuel BACHIMON
  • /CreationDate: D:20230504155302+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20230504155302+02'00'
  • /Producer: Microsoft® Word 2016
  • /Title: IAS Classic v5.2 on MultiApp V5.1- Security Target
  • pdf_file_size_bytes: 2282348
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 69
  • /Author: Christiane DROULERS
  • /CreationDate: D:20141212114311Z
  • /Creator: FrameMaker 11.0
  • /ModDate: D:20141212114311Z
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: SMD_MR31Zxxx_V2_2.book
  • pdf_file_size_bytes: 1552618
  • pdf_hyperlinks: http://www.st.com
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 107
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different