Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01)
ANSSI-CC-2023/12-R01
Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 )
ANSSI-CC-2023/42
name ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) Produit IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 Version 5.2.1.A.C et 5.2.1.A.O ( ANSSI-CC-2023/42 )
not_valid_before 2024-02-09 2023-09-29
not_valid_after 2029-02-09 2028-09-29
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2023_12-R01en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-2023_42en.pdf
manufacturer NXP Semiconductors Germany GmbH THALES DIS FRANCE SA
manufacturer_web https://www.nxp.com https://www.thalesgroup.com/en/europe/france
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_12-R01fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_42fr.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2023_12-R01fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_42fr.pdf
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2024, 4, 4), 'maintenance_title': 'ANSSI-CC-2023/42-M01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_42-M01fr.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_42-M01en.pdf'})
state/cert/pdf_hash e1a5b14333977f216acee5c152581a8b6c68dbd70c79d5c9005d37476fff802b 134cd5850c5bd12fdc4d6af64bfa49c02e4c213faa8bc1e0e95144922b6e0e60
state/cert/txt_hash b46f9034d06fb5042568f73747b09852ad03853225f89aee30b44bbdbea3f989 352da0876daf793f1f8dd7f0351178fcd331ec9adc07c6ed9e34c72ac70d30b5
state/report/pdf_hash 7e83de7a07b1ea03b15145ca89813e3dafa99f1495bc150c0d497588ca79d8d8 2603639438e480309c7af78cb36473da23607fd53db924bf5127909d5739d7fc
state/report/txt_hash 19df9d87294cdcb11e2d661e94e828b628ae263d66295dd8bc0e7fd314742803 1c3fc4c531b5ee7ff9546a68e54f3f750dbf77aa2ad871bf1195ba09d03e56f8
state/st/pdf_hash 82ff3172087d63ac4361d82fd2080c79f90305beb35b27697e8b3b0c4421b905 a266b1213a256ffc5091b8392717ae267836aed6a5edcd15221b708bd91afa4d
state/st/txt_hash 8b713c212821d937cd8aeaf4168b02b9daeb76f923f87e24a7de03c2a7966edd 14aee5a78fff1c35a4f6d618ff79ce5abdc73e9f83c986a85f4e6baefdfe892a
heuristics/cert_id ANSSI-CC-2023/12-R01 ANSSI-CC-2023/42
heuristics/extracted_versions 4.5, 4.0.1.52 5.2.1, 5.1, 3.1
heuristics/report_references/directly_referencing NSCIB-CC-0313985-CR, BSI-DSZ-CC-1149-V2-2023 ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/report_references/indirectly_referencing NSCIB-CC-0313985-CR, BSI-DSZ-CC-1149-2022, BSI-DSZ-CC-1149-V2-2023 ANSSI-CC-2023/01, ANSSI-CC-2023/31
heuristics/scheme_data/cert_id ANSSI-CC-2023/12-R01 ANSSI-CC-2023/42
heuristics/scheme_data/description Le produit évalué est « ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration, Version 4.0.1.52 » développé par NXP SEMICONDUCTORS. Ce produit offre des services d’authentification et de signature électronique (SSCD). Le produit évalué est l’application « IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1, Versions 5.2.1.A.C et 5.2.1.A.O » développée par THALES DIS FRANCE SAS et embarquée sur le microcontrôleur AQUARIUS_BA_09 fabriqué par THALES DIS. Ce produit est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD).    
heuristics/scheme_data/developer NXP SEMICONDUCTORS THALES DIS
heuristics/scheme_data/enhanced
  • cert_id: ANSSI-CC-2023/12-R01
  • certification_date: 09/02/2024
  • expiration_date: 09/02/2029
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r5
  • developer: NXP SEMICONDUCTORS
  • sponsor: NXP SEMICONDUCTORS
  • evaluation_facility: THALES / CNES
  • level: EAL5+
  • protection_profile: Protection profiles for secure signature creation device Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-02 Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
  • mutual_recognition: CCRA SOG-IS
  • augmented: ALC_DVS.2, AVA_VAN.5
  • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_12-R01fr.pdf
  • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2023_12-R01en.pdf
  • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-2023_12-R01fr.pdf
  • cert_id: ANSSI-CC-2023/42
  • certification_date: 22/09/2023
  • expiration_date: 22/09/2028
  • category: Cartes à puce
  • cc_version: Critères Communs version 3.1r5
  • developer: THALES DIS
  • sponsor: THALES DIS
  • evaluation_facility: CEA - LETI
  • level: EAL5+
  • protection_profile: Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4: Extension for device with key generation and trusted channel to certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part5: Extension for device with key generation and trusted communication with signature-creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6: Extension for device with key import and trusted channel to signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
  • mutual_recognition: CCRA SOG-IS
  • augmented: ALC_DVS.2, AVA_VAN.5
  • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_42fr.pdf
heuristics/scheme_data/enhanced/cert_id ANSSI-CC-2023/12-R01 ANSSI-CC-2023/42
heuristics/scheme_data/enhanced/cert_link https://cyber.gouv.fr/sites/default/files/document_type/certificat-2023_12-R01fr.pdf https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_42fr.pdf
heuristics/scheme_data/enhanced/certification_date 09/02/2024 22/09/2023
heuristics/scheme_data/enhanced/developer NXP SEMICONDUCTORS THALES DIS
heuristics/scheme_data/enhanced/evaluation_facility THALES / CNES CEA - LETI
heuristics/scheme_data/enhanced/expiration_date 09/02/2029 22/09/2028
heuristics/scheme_data/enhanced/protection_profile Protection profiles for secure signature creation device Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-02 Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01 Protection profiles for secure signature creation device : Part 2: Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 Part 3: Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4: Extension for device with key generation and trusted channel to certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part5: Extension for device with key generation and trusted communication with signature-creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6: Extension for device with key import and trusted channel to signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
heuristics/scheme_data/enhanced/sponsor NXP SEMICONDUCTORS THALES DIS
heuristics/scheme_data/expiration_date 9 Février 2029 22 Septembre 2028
heuristics/scheme_data/product ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) IAS Classic v5.2.1 with MOC Server v3.1 on MultiApp V5.1 (Versions 5.2.1.A.C et 5.2.1.A.O)
heuristics/scheme_data/sponsor NXP SEMICONDUCTORS THALES DIS
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/chipdoc-v4-jcop-45-p71-sscd-configuration-version-40152 https://cyber.gouv.fr/produits-certifies/ias-classic-v521-moc-server-v31-multiapp-v51-versions-521ac-et-521ao
heuristics/st_references/directly_referencing BSI-DSZ-CC-1149-V2-2023 None
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-1149-V2-2023 None
pdf_data/cert_filename certificat-2023_12-R01fr.pdf Certificat-CC-2023_42fr.pdf
pdf_data/cert_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/12-R01: 2
  • ANSSI-CC-2023/42: 2
pdf_data/cert_keywords/cc_claims
  • A:
    • A.C: 1
    • A.O: 1
pdf_data/cert_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0059-2009-MA-02: 1
  • BSI-CC-PP-0075-2012-MA01: 1
  • BSI-CC-PP-0071-2012-MA-01: 1
  • BSI-CC-PP-0072-2012-MA-01: 1
  • BSI-CC-PP-0076-2013-MA-01: 1
  • BSI-CC-PP-0059-2009-MA-02: 1
  • BSI-CC-PP-0075-2012-MA-01: 1
  • BSI-CC-PP-0071-2012-MA-01: 1
  • BSI-CC-PP-0072-2012-MA-01: 1
  • BSI-CC-PP-0076-2013-MA-01: 1
pdf_data/cert_keywords/eval_facility
  • Thales:
    • THALES/CNES: 1
  • CEA-LETI:
    • CEA - LETI: 2
pdf_data/cert_keywords/os_name
  • JCOP:
    • JCOP 4: 1
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP: 2
pdf_data/cert_metadata//CreationDate D:20240214225528+01'00' D:20230929173949+02'00'
pdf_data/cert_metadata//ModDate D:20240214231041+01'00' D:20230929174206+02'00'
pdf_data/cert_metadata/pdf_file_size_bytes 165401 158885
pdf_data/report_filename ANSSI-CC-2023_12-R01fr.pdf ANSSI-CC-2023_42fr.pdf
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1149-V2-2023: 1
  • FR:
    • ANSSI-CC-2023/12-R01: 2
  • NL:
    • NSCIB-CC-0313985-CR: 1
    • NSCIB-CC-0313985-1MA2: 1
  • FR:
    • ANSSI-CC-2023/42: 2
    • ANSSI-CC-2023/31: 3
    • ANSSI-CC-2023/01: 2
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/12-R01: 2
  • ANSSI-CC-2023/42: 2
  • ANSSI-CC-2023/31: 3
  • ANSSI-CC-2023/01: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.C: 4
    • A.O: 4
pdf_data/report_keywords/cc_protection_profile_id/other
  • PP-SSCD-Part2: 2
  • PP-SSCD-Part3: 2
  • PP-SSCD-Part4: 2
  • PP-SSCD-Part5: 2
  • PP-SSCD-Part6: 2
  • PP-SSCD-Part2: 2
  • PP-SSCD-Part3: 2
  • PP-SSCD-Part4: 2
  • PP-SSCD-Part5: 2
  • PP-SSCD-: 1
  • PP-SSCD-Part6: 1
pdf_data/report_keywords/cc_protection_profile_id/other/PP-SSCD-Part6 2 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
    • AVA_VAN: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
    • AVA_VAN: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • CESTI:
    • CESTI: 3
  • CEA-LETI:
    • CEA - LETI: 1
pdf_data/report_keywords/eval_facility/CESTI/CESTI 1 3
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 4: 7
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 5
    • NXP Semiconductors: 1
  • Gemalto:
    • Gemalto: 1
pdf_data/report_metadata//CreationDate D:20240214225643+01'00' D:20230929174115+02'00'
pdf_data/report_metadata//ModDate D:20240214231040+01'00' D:20230929174205+02'00'
pdf_data/report_metadata/pdf_file_size_bytes 362917 540883
pdf_data/report_metadata/pdf_number_of_pages 14 16
pdf_data/st_filename ANSSI-Cible-CC-2023_12-R01en.pdf ANSSI-cible-2023_42en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA-PSS: 1
  • ECC:
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 3
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 3
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
    • ECC:
      • ECC: 2
  • FF:
    • DH:
      • Diffie-Hellman: 2
      • DH: 2
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC 1 2
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH 2 1
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA 3 1
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH 7 2
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman 3 2
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1149-V2-2023: 2
  • NL:
    • CC-1: 2
    • CC-2: 2
    • CC-3: 3
pdf_data/st_keywords/cc_claims
  • O:
    • O.SID: 1
    • O.CIPHER: 1
    • O.KEY-MNGT: 1
    • O.REALLOCATION: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.ARRAY_VIEWS_CONFID: 1
    • O.PIN-MNGT: 1
    • O.OPERATE: 1
    • O.ALARM: 1
    • O.OBJ-DELETION: 1
    • O.SCP: 3
    • O.SECURE_LOAD_ACODE: 2
    • O.SECURE_AC_ACTIVATION: 2
    • O.CONFID-OS-UPDATE: 2
    • O.FIREWALL: 1
    • O.NATIVE: 1
    • O.RNG: 1
    • O.LOAD: 1
    • O.INSTALL: 1
    • O.DELETION: 1
    • O.TRANSACTION: 1
    • O.RESOURCES: 1
    • O.CARD-MANAGEMENT: 1
    • O.TOE_IDENTIFICATION: 1
  • A:
    • A.C: 5
    • A.O: 5
    • A.CGA: 3
    • A.SCA: 3
    • A.CSP: 3
    • A.CAP_FILE: 4
    • A.VERIFICATION: 4
  • OE:
    • OE.HID_VAD: 3
    • OE.VERIFICATION: 7
    • OE.CAP_FILE: 5
    • OE.CODE-EVIDENCE: 5
    • OE.SCP: 2
    • OE.CARD-MANAGEMENT: 1
    • OE.PERSONALISATION: 2
    • OE.TERMINAL: 2
    • OE.PROT_LOGICAL_DATA: 1
    • OE.USER_OBLIGATIONS: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0086: 1
    • BSI-CC-PP-0068-: 1
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0087-V2-MA-01: 1
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0099-V2-2020: 1
  • other:
    • PP-SSCD-KG: 37
    • PP-SSCD-KI: 28
    • PP-SSCD: 4
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0059-2009-MA-02: 1
  • BSI-CC-PP-0075-2012-MA-01: 1
  • BSI-CC-PP-0071-2012-MA-01: 1
  • BSI-CC-PP-0072-2012-MA-01: 1
  • BSI-CC-PP-0076-2013-MA-01: 1
  • BSI-CC-PP-0056-V2-2012-MA-02: 1
  • BSI-CC-PP-0086: 1
  • BSI-CC-PP-0068-: 1
  • BSI-CC-PP-0055: 1
  • BSI-CC-PP-0087-V2-MA-01: 1
  • BSI-CC-PP-0059-2009-MA-02: 1
  • BSI-CC-PP-0075-2012-MA-01: 1
  • BSI-CC-PP-0071-2012-MA-01: 1
  • BSI-CC-PP-0072-2012-MA-01: 1
  • BSI-CC-PP-0076-2013-MA-01: 1
  • BSI-CC-PP-0099-V2-2020: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 5
    • ADV_FSP.5: 6
    • ADV_IMP.1: 5
    • ADV_INT.2: 2
    • ADV_TDS.4: 8
    • ADV_FSP.4: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 5
  • ALC:
    • ALC_DVS.2: 6
    • ALC_CMC.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL.1: 2
    • ALC_LCD.1: 3
    • ALC_TAT.2: 3
    • ALC_DVS.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.3: 1
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN.5: 4
  • ASE:
    • ASE_INT.1: 4
    • ASE_CCL.1: 2
    • ASE_SPD.1: 1
    • ASE_OBJ.2: 3
    • ASE_ECD.1: 1
    • ASE_REQ.2: 4
    • ASE_TSS.1: 2
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 6
  • ALC_CMC.4: 2
  • ALC_CMS.5: 1
  • ALC_DEL.1: 2
  • ALC_LCD.1: 3
  • ALC_TAT.2: 3
  • ALC_DVS.1: 1
  • ALC_TAT.1: 1
  • ALC_DVS.2: 3
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 6 3
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 4 3
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 8
  • EAL5 augmented: 4
  • EAL5+: 1
  • EAL 5+: 1
  • EAL5: 3
  • EAL5 augmented: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL5 8 3
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented 4 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 5
    • FAU_GEN: 1
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RND: 5
    • FCS_RND.1: 17
    • FCS_CKM.1: 3
    • FCS_RND.1.1: 2
    • FCS_CKM: 52
    • FCS_CKM.4: 2
    • FCS_COP: 58
    • FCS_COP.1: 2
  • FDP:
    • FDP_SDC: 10
    • FDP_SDC.1: 6
    • FDP_SDI: 5
    • FDP_SDC.1.1: 1
    • FDP_ACF: 22
    • FDP_RIP: 28
    • FDP_ACC: 22
    • FDP_ACC.1: 5
    • FDP_ACF.1: 22
    • FDP_DAU: 3
    • FDP_DAU.2: 2
    • FDP_ITC: 2
    • FDP_ITC.1: 3
    • FDP_UCT: 11
    • FDP_UCT.1: 2
    • FDP_UIT: 9
    • FDP_UIT.1: 4
    • FDP_RIP.1: 4
    • FDP_SDI.2: 4
  • FIA:
    • FIA_API: 24
    • FIA_SOS.2: 1
    • FIA_UAU.4: 2
    • FIA_UAU: 96
    • FIA_AFL: 34
    • FIA_AFL.1: 5
    • FIA_API.1: 3
    • FIA_UID: 39
    • FIA_UID.1: 6
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.5: 2
    • FIA_UAU.6: 1
  • FMT:
    • FMT_LIM: 4
    • FMT_LIM.1: 12
    • FMT_LIM.2: 11
    • FMT_LIM.1.1: 2
    • FMT_LIM.2.1: 2
    • FMT_MTD: 98
    • FMT_MOF: 7
    • FMT_MOF.1: 3
    • FMT_MTD.1: 6
    • FMT_MSA: 18
    • FMT_MSA.1: 4
    • FMT_MSA.2: 1
    • FMT_MSA.3: 9
    • FMT_MSA.4: 2
    • FMT_MTD.3: 9
    • FMT_MTD.3.1: 1
    • FMT_SMF: 22
    • FMT_SMF.1: 3
    • FMT_SMR: 20
    • FMT_SMR.1: 4
  • FPT:
    • FPT_EMS: 12
    • FPT_LIM: 1
    • FPT_LIM.1: 1
    • FPT_LIM.2: 1
    • FPT_TST.1: 7
    • FPT_EMS.1: 5
    • FPT_FLS.1: 4
    • FPT_FLS.1.1: 1
    • FPT_TST: 8
    • FPT_FLS: 11
    • FPT_PHP.1: 2
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 3
    • FPT_PHP.3.1: 1
    • FPT_PHP: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 30
    • FTP_ITC.1: 6
  • FAU:
    • FAU_ARP.1: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM: 59
    • FCS_CKM.4: 12
    • FCS_COP: 35
    • FCS_COP.1: 6
    • FCS_CKM.1.1: 2
    • FCS_CKM.1: 10
    • FCS_CKM.4.1: 2
    • FCS_COP.1.1: 2
    • FCS_CKM.2: 3
    • FCS_CKM.3: 1
    • FCS_RNG.1: 2
    • FCS_RNG: 1
  • FDP:
    • FDP_DAU: 11
    • FDP_UIT: 10
    • FDP_ITC.1: 9
    • FDP_ITC.2: 8
    • FDP_ACC: 55
    • FDP_ACF.1: 9
    • FDP_ACC.1.1: 4
    • FDP_ACF: 43
    • FDP_ACC.1: 27
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_DAU.1: 1
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_ITC: 11
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_RIP.1: 17
    • FDP_RIP.1.1: 1
    • FDP_SDI: 22
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UCT: 11
    • FDP_UCT.1: 1
    • FDP_UIT.1: 2
    • FDP_AFC: 1
    • FDP_IFC.1: 9
    • FDP_IFC: 2
    • FDP_IFF: 2
    • FDP_RIP: 6
  • FIA:
    • FIA_API: 5
    • FIA_AFL: 20
    • FIA_API.1: 14
    • FIA_API.1.1: 2
    • FIA_UAU.1: 8
    • FIA_UID.1: 14
    • FIA_AFL.1: 4
    • FIA_UAU: 28
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 25
    • FIA_ATD: 2
    • FIA_USB: 1
  • FMT:
    • FMT_MSA.3: 15
    • FMT_MOF.1: 9
    • FMT_SMR.1: 36
    • FMT_SMF.1: 27
    • FMT_MOF.1.1: 1
    • FMT_MSA: 80
    • FMT_MSA.1: 10
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.4: 3
    • FMT_MTD: 25
    • FMT_MTD.1: 3
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMR: 7
    • FMT_SMF: 6
    • FMT_LIM: 2
  • FPR:
    • FPR_UNO.1: 1
    • FPR_UNO: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_TST.1: 14
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_TST: 2
    • FPT_PHP.1: 8
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_FLS: 6
    • FPT_RCV: 2
  • FTP:
    • FTP_ITC: 42
    • FTP_ITC.1: 16
    • FTP_TRP.1: 4
    • FTP_TRP: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS: 5
  • FAU_GEN: 1
  • FAU_SAS.1: 11
  • FAU_SAS.1.1: 2
  • FAU_ARP.1: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 5
  • FCS_RND.1: 17
  • FCS_CKM.1: 3
  • FCS_RND.1.1: 2
  • FCS_CKM: 52
  • FCS_CKM.4: 2
  • FCS_COP: 58
  • FCS_COP.1: 2
  • FCS_CKM: 59
  • FCS_CKM.4: 12
  • FCS_COP: 35
  • FCS_COP.1: 6
  • FCS_CKM.1.1: 2
  • FCS_CKM.1: 10
  • FCS_CKM.4.1: 2
  • FCS_COP.1.1: 2
  • FCS_CKM.2: 3
  • FCS_CKM.3: 1
  • FCS_RNG.1: 2
  • FCS_RNG: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM 52 59
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 3 10
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 2 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP 58 35
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 2 6
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_SDC: 10
  • FDP_SDC.1: 6
  • FDP_SDI: 5
  • FDP_SDC.1.1: 1
  • FDP_ACF: 22
  • FDP_RIP: 28
  • FDP_ACC: 22
  • FDP_ACC.1: 5
  • FDP_ACF.1: 22
  • FDP_DAU: 3
  • FDP_DAU.2: 2
  • FDP_ITC: 2
  • FDP_ITC.1: 3
  • FDP_UCT: 11
  • FDP_UCT.1: 2
  • FDP_UIT: 9
  • FDP_UIT.1: 4
  • FDP_RIP.1: 4
  • FDP_SDI.2: 4
  • FDP_DAU: 11
  • FDP_UIT: 10
  • FDP_ITC.1: 9
  • FDP_ITC.2: 8
  • FDP_ACC: 55
  • FDP_ACF.1: 9
  • FDP_ACC.1.1: 4
  • FDP_ACF: 43
  • FDP_ACC.1: 27
  • FDP_ACF.1.1: 4
  • FDP_ACF.1.2: 4
  • FDP_ACF.1.3: 4
  • FDP_ACF.1.4: 4
  • FDP_DAU.1: 1
  • FDP_DAU.2.1: 1
  • FDP_DAU.2.2: 1
  • FDP_ITC: 11
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_RIP.1: 17
  • FDP_RIP.1.1: 1
  • FDP_SDI: 22
  • FDP_SDI.1: 2
  • FDP_SDI.2: 4
  • FDP_UCT: 11
  • FDP_UCT.1: 1
  • FDP_UIT.1: 2
  • FDP_AFC: 1
  • FDP_IFC.1: 9
  • FDP_IFC: 2
  • FDP_IFF: 2
  • FDP_RIP: 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 22 55
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 5 27
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 22 43
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 22 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_DAU 3 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 2 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 3 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP 28 6
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 4 17
pdf_data/st_keywords/cc_sfr/FDP/FDP_SDI 5 22
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 9 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 4 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API: 24
  • FIA_SOS.2: 1
  • FIA_UAU.4: 2
  • FIA_UAU: 96
  • FIA_AFL: 34
  • FIA_AFL.1: 5
  • FIA_API.1: 3
  • FIA_UID: 39
  • FIA_UID.1: 6
  • FIA_UAU.1: 14
  • FIA_UAU.1.1: 1
  • FIA_UAU.5: 2
  • FIA_UAU.6: 1
  • FIA_API: 5
  • FIA_AFL: 20
  • FIA_API.1: 14
  • FIA_API.1.1: 2
  • FIA_UAU.1: 8
  • FIA_UID.1: 14
  • FIA_AFL.1: 4
  • FIA_UAU: 28
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UID: 25
  • FIA_ATD: 2
  • FIA_USB: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 34 20
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 5 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_API 24 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_API.1 3 14
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU 96 28
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 14 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID 39 25
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 6 14
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 4
  • FMT_LIM.1: 12
  • FMT_LIM.2: 11
  • FMT_LIM.1.1: 2
  • FMT_LIM.2.1: 2
  • FMT_MTD: 98
  • FMT_MOF: 7
  • FMT_MOF.1: 3
  • FMT_MTD.1: 6
  • FMT_MSA: 18
  • FMT_MSA.1: 4
  • FMT_MSA.2: 1
  • FMT_MSA.3: 9
  • FMT_MSA.4: 2
  • FMT_MTD.3: 9
  • FMT_MTD.3.1: 1
  • FMT_SMF: 22
  • FMT_SMF.1: 3
  • FMT_SMR: 20
  • FMT_SMR.1: 4
  • FMT_MSA.3: 15
  • FMT_MOF.1: 9
  • FMT_SMR.1: 36
  • FMT_SMF.1: 27
  • FMT_MOF.1.1: 1
  • FMT_MSA: 80
  • FMT_MSA.1: 10
  • FMT_MSA.2: 9
  • FMT_MSA.2.1: 1
  • FMT_MSA.4: 3
  • FMT_MTD: 25
  • FMT_MTD.1: 3
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMR: 7
  • FMT_SMF: 6
  • FMT_LIM: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM 4 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 3 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 18 80
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 4 10
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 1 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 9 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.4 2 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 98 25
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 6 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF 22 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 3 27
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR 20 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 4 36
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 12
  • FPT_LIM: 1
  • FPT_LIM.1: 1
  • FPT_LIM.2: 1
  • FPT_TST.1: 7
  • FPT_EMS.1: 5
  • FPT_FLS.1: 4
  • FPT_FLS.1.1: 1
  • FPT_TST: 8
  • FPT_FLS: 11
  • FPT_PHP.1: 2
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 3
  • FPT_PHP.3.1: 1
  • FPT_PHP: 7
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_EMS: 5
  • FPT_EMS.1: 14
  • FPT_EMS.1.1: 4
  • FPT_EMS.1.2: 3
  • FPT_TST.1: 14
  • FPT_FLS.1: 13
  • FPT_FLS.1.1: 1
  • FPT_TST: 2
  • FPT_PHP.1: 8
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 11
  • FPT_PHP.3.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_FLS: 6
  • FPT_RCV: 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS 12 5
pdf_data/st_keywords/cc_sfr/FPT/FPT_EMS.1 5 14
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS 11 6
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 4 13
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.1 2 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 3 11
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST 8 2
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 7 14
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC: 30
  • FTP_ITC.1: 6
  • FTP_ITC: 42
  • FTP_ITC.1: 16
  • FTP_TRP.1: 4
  • FTP_TRP: 1
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 30 42
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 6 16
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • by authorized users. The functionalities of IAS Classic 5.2.1 other than the ones from SSCD are out of scope of the TOE perimeter. For BioPIN (MOC Server v3.1.1 application) provides biometry recognition with: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/st_keywords/crypto_protocol/PACE/PACE 190 16
pdf_data/st_keywords/crypto_scheme/MAC/MAC 5 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 4
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 5
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG3: 6
    • EF.DG4: 6
    • EF.DG1: 3
    • EF.DG16: 3
    • EF.DG14: 2
    • EF.SOD: 1
    • EF.ChipSecurity: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 4: 117
pdf_data/st_keywords/randomness/RNG
  • RNG: 1
  • RNG: 3
  • RND: 1
pdf_data/st_keywords/randomness/RNG/RNG 1 3
pdf_data/st_keywords/side_channel_analysis/FI
  • physical tampering: 5
  • Physical Tampering: 3
  • malfunction: 9
  • Malfunction: 4
  • physical tampering: 4
  • DFA: 1
  • fault induction: 1
  • fault injection: 1
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering 5 4
pdf_data/st_keywords/side_channel_analysis/SCA
  • physical probing: 4
  • SPA: 1
  • DPA: 1
  • timing attacks: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 186-4: 2
    • FIPS 46-3: 4
    • FIPS 197: 5
    • FIPS180-4: 1
    • FIPS 180-4: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#3: 1
    • PKCS#1: 3
  • BSI:
    • AIS31: 1
  • ISO:
    • ISO/IEC 14888-3: 1
  • ICAO:
    • ICAO: 32
    • ICAO-SAC: 1
  • SCP:
    • SCP03: 10
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS197: 2
  • PKCS:
    • PKCS#3: 3
    • PKCS#1: 2
  • ICAO:
    • ICAO: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2012-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2017-04-001: 2
  • CCMB-2017-04-002: 2
  • CCMB-2017-04-003: 2
  • CCMB-2017-04-004: 2
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2012-04-003: 1
  • CCMB-2017-04-004: 1
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-001 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-002 2 1
pdf_data/st_keywords/standard_id/CC/CCMB-2017-04-004 2 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 186-4: 2
  • FIPS 46-3: 4
  • FIPS 197: 5
  • FIPS180-4: 1
  • FIPS 180-4: 1
  • FIPS PUB 46-3: 1
  • FIPS197: 2
pdf_data/st_keywords/standard_id/ICAO
  • ICAO: 32
  • ICAO-SAC: 1
  • ICAO: 2
pdf_data/st_keywords/standard_id/ICAO/ICAO 32 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#1 3 2
pdf_data/st_keywords/standard_id/PKCS/PKCS#3 1 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 25
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • TDES: 8
  • constructions:
    • MAC:
      • KMAC: 2
      • CMAC: 6
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • TDES: 4
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 25 6
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES 8 4
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 5 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 2
pdf_data/st_keywords/vendor
  • NXP:
    • NXP Semiconductors: 38
    • NXP: 122
  • Thales:
    • Thales: 75
pdf_data/st_metadata
  • pdf_file_size_bytes: 929958
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 103
  • /Title: Security Target Lite
  • /Author: NXP B.V.
  • /Subject: ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration
  • /Keywords: Common Criteria, Security Target Lite, ChipDoc v4, SSCD
  • /Creator: DITA Open Toolkit 3.3.1
  • /Producer: Apache FOP Version 2.3
  • /CreationDate: D:20231010235706+02'00'
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 2282348
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 69
  • /Title: IAS Classic v5.2 on MultiApp V5.1- Security Target
  • /Author: Emmanuel BACHIMON
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20230504155302+02'00'
  • /ModDate: D:20230504155302+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks:
pdf_data/st_metadata//Author NXP B.V. Emmanuel BACHIMON
pdf_data/st_metadata//CreationDate D:20231010235706+02'00' D:20230504155302+02'00'
pdf_data/st_metadata//Creator DITA Open Toolkit 3.3.1 Microsoft® Word 2016
pdf_data/st_metadata//Producer Apache FOP Version 2.3 Microsoft® Word 2016
pdf_data/st_metadata//Title Security Target Lite IAS Classic v5.2 on MultiApp V5.1- Security Target
pdf_data/st_metadata/pdf_file_size_bytes 929958 2282348
pdf_data/st_metadata/pdf_number_of_pages 103 69
dgst 6ee673a8fd9cbf07 5f61ebf23c6ad99d