name |
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 ) |
ST33TPMF2ESPI Hardware ST33HTPM révision interne C,Firmware versions 1.2.46.00 et 1.2.46.08 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Trusted Computing |
scheme |
FR |
FR |
status |
active |
archived |
not_valid_after |
29.09.2028 |
29.01.2021 |
not_valid_before |
29.09.2023 |
29.01.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_42fr.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_42fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_80.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_42en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2015_80%20-%20Cible%20publique.pdf |
manufacturer |
THALES DIS FRANCE SA |
STMicroelectronics |
manufacturer_web |
https://www.thalesgroup.com/en/europe/france |
https://www.st.com/ |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
ALC_FLR.1, EAL4+, AVA_VAN.4 |
dgst |
5f61ebf23c6ad99d |
d8a55f9889ec1f0f |
heuristics/cert_id |
ANSSI-CC-2023/42 |
ANSSI-CC-2015/80 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.2, AVA_VAN.5 |
ASE_INT.1, ALC_TAT.1, ATE_FUN.1, ALC_FLR.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1, ALC_CMS.4, ATE_IND.2, ASE_SPD.1, ASE_OBJ.2, ADV_FSP.4, ATE_COV.2, ASE_REQ.2, ALC_CMC.4, ADV_ARC.1, AVA_VAN.4, ALC_DEL.1, ATE_DPT.1, ADV_TDS.3, ADV_IMP.3, AGD_OPE.1, ALC_LCD.1, ASE_ECD.1 |
heuristics/extracted_versions |
5.1, 3.1, 5.2.1 |
1.2.46.08, 1.2.46.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2016/33, ANSSI-CC-2017/40, ANSSI-CC-2016/43, ANSSI-CC-2016/79, ANSSI-CC-2016/78, ANSSI-CC-2016/77, ANSSI-CC-2016/44 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
ANSSI-CC-2015/36 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2018/41, ANSSI-CC-2017/40, ANSSI-CC-2018/39, ANSSI-CC-2019/54, ANSSI-CC-2017/73, ANSSI-CC-2016/79, ANSSI-CC-2020/40, ANSSI-CC-2019/46, ANSSI-CC-2017/02, ANSSI-CC-2020/28, ANSSI-CC-2016/44, ANSSI-CC-2017/39, ANSSI-CC-2017/38, ANSSI-CC-2019/44, ANSSI-CC-2016/78, ANSSI-CC-2016/77, BSI-DSZ-CC-1070-2018, ANSSI-CC-2019/45, ANSSI-CC-2019/52, ANSSI-CC-2016/33, ANSSI-CC-2019/37, ANSSI-CC-2019/53, ANSSI-CC-2016/43, BSI-DSZ-CC-1111-2019, BSI-DSZ-CC-1131-V2-2023, BSI-DSZ-CC-1131-2020 |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2023/01, ANSSI-CC-2023/31 |
ANSSI-CC-2015/36 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/42
- description: Le produit évalué est l’application « IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1, Versions 5.2.1.A.C et 5.2.1.A.O » développée par THALES DIS FRANCE SAS et embarquée sur le microcontrôleur AQUARIUS_BA_09 fabriqué par THALES DIS. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD).
- developer: THALES DIS
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/42
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_42fr.pdf
- certification_date: 22.09.2023
- developer: THALES DIS
- evaluation_facility: CEA - LETI
- expiration_date: 22.09.2028
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4: Extension for device with key generation and trusted channel to certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part5: Extension for device with key generation and trusted communication with signature-creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6: Extension for device with key import and trusted channel to signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
- sponsor: THALES DIS
- expiration_date: 22.09.2028
- level: EAL5+
- product: IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 (Versions 5.2.1.A.C et 5.2.1.A.O)
- sponsor: THALES DIS
- url: https://cyber.gouv.fr/produits-certifies/ias-classic-v521-moc-server-v31-multiapp-v51-versions-521ac-et-521ao
|
- cert_id: ANSSI-CC-2015/80
- description: Le produit certifié est le composant « ST33TPMF2ESPI, Hardware ST33HTPM révision C, Firmware versions 1.2.46.00 et 1.2.46.08 » développé par STMICROELECTRONICS. Ce produit est destiné à garantir l’intégrité matérielle et logicielle des plateformes de confiance (serveurs, ordinateurs, etc.) conformément aux spécifications fonctionnelles TPM (Trusted Platform Module).
- developer: STMicroelectronics
- enhanced:
- level: EAL4+
- product: ST33TPMF2ESPI
- sponsor: STMicroelectronics
- url: https://cyber.gouv.fr/produits-certifies/st33tpmf2espi
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2023_42fr.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20230929173949+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20230929174206+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 158885
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
ANSSI-CC-2023_42fr.pdf |
ANSSI-CC-2015_80.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_FLR.1, AVA_VAN.4
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2015/80
- cert_item: ST33TPMF2ESPI
- cert_item_version: Hardware ST33HTPM révision interne C, Firmware versions 1.2.46.00 et 1.2.46.08
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: STMicroelectronics Lambroekstraat 5, Building B, 3rd floor, 1831 Diegem/Machelen, Belgique Commanditaire STMicroelectronics Lambroekstraat 5, Building B, 3rd floor, 1831 Diegem/Machelen, Belgique
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0030-2008-MA-02], version v1.2 PC Client Specific Trusted Platform Module TPM, Family 1.2
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2023/01: 2
- ANSSI-CC-2023/31: 3
- ANSSI-CC-2023/42: 2
|
- FR:
- ANSSI-CC-2015/36: 1
- ANSSI-CC-2015/80: 18
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075-2012-MA-01: 2
- BSI-CC-PP-0076-2013-MA-01: 2
- other:
- PP-SSCD-: 1
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 1
|
- BSI:
- BSI-CC-PP- 0030-2008-: 1
- BSI-CC-PP-0030-2008-MA-02: 4
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 1
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL4: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.1: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- STMicroelectronics:
- Thales:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2015_80
- pdf_file_size_bytes: 1315845
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
ANSSI-cible-2023_42en.pdf |
2015_80 - Cible publique.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0099-V2-2020: 1
- other:
- PP-SSCD: 4
- PP-SSCD-KG: 37
- PP-SSCD-KI: 28
|
- BSI:
- BSI-PP-0030-2008-MA-02: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5+: 1
- EAL5: 3
- EAL5 augmented: 1
- EAL5+: 1
|
- EAL:
- EAL4: 2
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.3: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_FLR.1: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCO:
- FCS:
- FCS_CKM: 59
- FCS_CKM.1: 10
- FCS_CKM.1.1: 2
- FCS_CKM.2: 3
- FCS_CKM.3: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 2
- FCS_COP: 35
- FCS_COP.1: 6
- FCS_COP.1.1: 2
- FCS_RNG: 1
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 55
- FDP_ACC.1: 27
- FDP_ACC.1.1: 4
- FDP_ACF: 43
- FDP_ACF.1: 9
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_AFC: 1
- FDP_DAU: 11
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_IFC: 2
- FDP_IFC.1: 9
- FDP_IFF: 2
- FDP_ITC: 11
- FDP_ITC.1: 9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.2: 8
- FDP_RIP: 6
- FDP_RIP.1: 17
- FDP_RIP.1.1: 1
- FDP_SDI: 22
- FDP_SDI.1: 2
- FDP_SDI.2: 4
- FDP_UCT: 11
- FDP_UCT.1: 1
- FDP_UIT: 10
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 20
- FIA_AFL.1: 4
- FIA_API: 5
- FIA_API.1: 14
- FIA_API.1.1: 2
- FIA_ATD: 2
- FIA_UAU: 28
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 25
- FIA_UID.1: 14
- FIA_USB: 1
- FMT:
- FMT_LIM: 2
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 80
- FMT_MSA.1: 10
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 15
- FMT_MSA.4: 3
- FMT_MTD: 25
- FMT_MTD.1: 3
- FMT_SMF: 6
- FMT_SMF.1: 27
- FMT_SMF.1.1: 1
- FMT_SMR: 7
- FMT_SMR.1: 36
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 14
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS: 6
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 11
- FPT_PHP.3.1: 1
- FPT_RCV: 2
- FPT_TST: 2
- FPT_TST.1: 14
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 42
- FTP_ITC.1: 16
- FTP_TRP: 1
- FTP_TRP.1: 4
|
- FAU:
- FCO:
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP: 14
- FCS_COP.1: 6
- FCS_COP.1.1: 3
- FCS_RNG: 2
- FCS_RNG.1: 9
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 25
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF: 23
- FDP_ACF.1: 18
- FDP_ACF.1.1: 6
- FDP_ACF.1.2: 6
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 6
- FDP_ETC.2: 3
- FDP_IFC.1: 3
- FDP_ITC.1: 5
- FDP_ITC.2: 10
- FDP_RIP.1: 2
- FDP_TDC.1: 1
- FDP_UCT: 4
- FDP_UCT.1: 1
- FDP_UIT: 10
- FDP_UIT.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 5
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 3
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 3
- FIA_UID.1: 5
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 42
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 17
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 4
- FMT_MTD: 8
- FMT_MTD.1: 1
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FPR:
- FPT:
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP.3: 2
- FPT_PHP.3.1: 1
- FPT_STM.1: 3
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 2
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.C: 5
- A.CAP_FILE: 4
- A.CGA: 3
- A.CSP: 3
- A.O: 5
- A.SCA: 3
- A.VERIFICATION: 4
- O:
- O.ALARM: 1
- O.ARRAY_VIEWS_CONFID: 1
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 1
- O.CONFID-OS-UPDATE: 2
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.INSTALL: 1
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.RNG: 1
- O.SCP: 3
- O.SECURE_AC_ACTIVATION: 2
- O.SECURE_LOAD_ACODE: 2
- O.SID: 1
- O.TOE_IDENTIFICATION: 1
- O.TRANSACTION: 1
- OE:
- OE.CAP_FILE: 5
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 5
- OE.HID_VAD: 3
- OE.PERSONALISATION: 2
- OE.PROT_LOGICAL_DATA: 1
- OE.SCP: 2
- OE.TERMINAL: 2
- OE.USER_OBLIGATIONS: 1
- OE.VERIFICATION: 7
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 1
- fault induction: 1
- fault injection: 1
- physical tampering: 4
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 2
- side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-04-003: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-004: 1
- FIPS:
- ICAO:
- PKCS:
|
- BSI:
- AIS 20: 2
- AIS 31: 1
- AIS20: 2
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 3
- CCMB-2012-09-04: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-2: 3
- FIPS 197: 2
- FIPS 46-3: 1
- FIPS PUB 180-2: 2
- FIPS PUB 197: 2
- NIST:
- SP 800-17: 1
- SP 800-38A: 2
- SP 800-90A: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- by authorized users. The functionalities of IAS Classic 5.2.1 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1.1 application) provides biometry recognition with: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Emmanuel BACHIMON
- /CreationDate: D:20230504155302+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20230504155302+02'00'
- /Producer: Microsoft® Word 2016
- /Title: IAS Classic v5.2 on MultiApp V5.1- Security Target
- pdf_file_size_bytes: 2282348
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 69
|
- /Author: olivier collart
- /CreationDate: D:20151016182226+02'00'
- /Creator: PDFCreator Version 1.5.1
- /Keywords:
- /ModDate: D:20151016182226+02'00'
- /Producer: GPL Ghostscript 9.05
- /Subject:
- /Title: ST33TPMF2ESPI_ST (01.01p)
- pdf_file_size_bytes: 779350
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 55
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |