Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01)
ANSSI-CC-2023/12-R01
Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61)
ANSSI-CC-2023/61
name ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) (ANSSI-CC-2023/12-R01) Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 , macOS Ventura 13.3.1 (build 22E261) ( ANSSI-CC-2023/61)
not_valid_before 2024-02-09 2023-12-28
not_valid_after 2029-02-09 2028-12-28
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2023_12-R01en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_61en.pdf
manufacturer NXP Semiconductors Germany GmbH Apple Inc.
manufacturer_web https://www.nxp.com https://www.apple.com/
security_level EAL5+, AVA_VAN.5, ALC_DVS.2 ADV_FSP.3, EAL2+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_12-R01fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_61en.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2023_12-R01fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_61en.pdf
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 6: Extension for device with key impo...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device - Part 3: Device with key import', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0075b_pdf.pdf', 'pp_ids': frozenset({'PP_SSCD_PART3_V1.0.2'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 5: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Secure Signature Creation Device - Part 2: Device with Key Generation, Version...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf', 'pp_ids': None}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection profiles for secure signature creation device — Part 4: Extension for device with key gene...', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf', 'pp_ids': None})
state/cert/pdf_hash e1a5b14333977f216acee5c152581a8b6c68dbd70c79d5c9005d37476fff802b f9904c33a3da40eceacbea0a231cfd0a52340cb34599c1a160574f96336ebf57
state/cert/txt_hash b46f9034d06fb5042568f73747b09852ad03853225f89aee30b44bbdbea3f989 964e8be87743c7c4d6827e3dfc178ca3755d651db7b5797d8209c52c1fffe466
state/report/pdf_hash 7e83de7a07b1ea03b15145ca89813e3dafa99f1495bc150c0d497588ca79d8d8 1aa2706b18f951f16655b8e5d76bb670d733f005b0144e5478c3756a92853151
state/report/txt_hash 19df9d87294cdcb11e2d661e94e828b628ae263d66295dd8bc0e7fd314742803 bedda77fe46aa241810159a366524aebfeefca15fd147bf8e3125949a7a5b3ff
state/st/pdf_hash 82ff3172087d63ac4361d82fd2080c79f90305beb35b27697e8b3b0c4421b905 e2ce81c073ea3d6f4b5b0fa8962b1889260c8e7eb293c3760bd60011a5032949
state/st/txt_hash 8b713c212821d937cd8aeaf4168b02b9daeb76f923f87e24a7de03c2a7966edd a6cd365236aa1a5ecedfb11531f99c1581659e19f1a77698a403b81b075b9ade
heuristics/cert_id ANSSI-CC-2023/12-R01 ANSSI-CC-2023/61
heuristics/cpe_matches None cpe:2.3:o:apple:macos:13.3.1:*:*:*:*:*:*:*, cpe:2.3:o:apple:macos:13.3:*:*:*:*:*:*:*
heuristics/extracted_versions 4.5, 4.0.1.52 13.3.1
heuristics/related_cves None CVE-2023-32361, CVE-2023-41979, CVE-2023-35984, CVE-2023-40432, CVE-2023-42957, CVE-2023-42914, CVE-2023-40409, CVE-2023-32428, CVE-2024-40801, CVE-2023-42932, CVE-2023-38611, CVE-2023-41067, CVE-2024-40799, CVE-2024-27799, CVE-2023-41992, CVE-2024-40815, CVE-2023-38607, CVE-2024-44134, CVE-2023-40414, CVE-2023-32432, CVE-2023-38572, CVE-2023-38594, CVE-2023-39233, CVE-2024-40803, CVE-2023-42925, CVE-2023-40388, CVE-2023-32382, CVE-2023-40389, CVE-2023-32414, CVE-2023-32418, CVE-2024-23237, CVE-2023-42866, CVE-2023-4734, CVE-2024-23261, CVE-2023-42829, CVE-2023-41064, CVE-2024-40848, CVE-2024-40776, CVE-2023-32405, CVE-2023-32429, CVE-2023-38598, CVE-2023-40402, CVE-2023-40406, CVE-2023-40392, CVE-2023-42899, CVE-2024-44168, CVE-2023-40384, CVE-2023-32387, CVE-2023-38410, CVE-2024-27831, CVE-2023-34425, CVE-2024-23203, CVE-2023-32398, CVE-2024-44133, CVE-2023-32391, CVE-2024-40818, CVE-2024-23268, CVE-2023-32367, CVE-2023-38616, CVE-2024-27885, CVE-2023-32390, CVE-2023-40417, CVE-2024-40785, CVE-2024-27872, CVE-2024-40779, CVE-2023-32410, CVE-2024-44130, CVE-2024-27858, CVE-2024-44129, CVE-2023-40541, CVE-2024-44177, CVE-2024-27817, CVE-2024-27884, CVE-2024-40770, CVE-2023-32416, CVE-2023-42828, CVE-2024-44128, CVE-2024-44189, CVE-2023-32407, CVE-2023-40441, CVE-2024-40774, CVE-2023-4750, CVE-2024-27875, CVE-2023-4781, CVE-2023-32363, CVE-2023-42833, CVE-2023-41073, CVE-2024-44188, CVE-2023-38610, CVE-2023-32443, CVE-2023-35074, CVE-2023-40413, CVE-2024-40831, CVE-2024-40780, CVE-2023-35993, CVE-2024-23296, CVE-2023-32404, CVE-2024-44146, CVE-2023-41968, CVE-2023-40399, CVE-2023-42871, CVE-2023-32368, CVE-2023-38600, CVE-2023-40391, CVE-2023-32422, CVE-2023-38593, CVE-2024-40832, CVE-2023-40450, CVE-2023-38601, CVE-2023-38602, CVE-2023-40407, CVE-2024-40845, CVE-2024-40807, CVE-2023-40438, CVE-2023-32396, CVE-2024-27809, CVE-2024-44164, CVE-2023-32372, CVE-2023-40455, CVE-2024-44131, CVE-2024-44186, CVE-2023-32371, CVE-2023-40426, CVE-2023-41078, CVE-2023-32441, CVE-2023-32388, CVE-2023-38609, CVE-2024-40866, CVE-2023-40423, CVE-1999-0590, CVE-2023-28320, CVE-2023-4752, CVE-2024-23209, CVE-2023-38595, CVE-2023-32411, CVE-2023-32403, CVE-2023-32445, CVE-2024-40787, CVE-2023-32364, CVE-2023-42933, CVE-2023-40434, CVE-2024-44148, CVE-2023-32385, CVE-2023-41995, CVE-2023-32380, CVE-2023-40528, CVE-2024-44182, CVE-2023-42888, CVE-2023-32439, CVE-2024-40775, CVE-2024-44176, CVE-2023-42884, CVE-2023-36862, CVE-2023-40429, CVE-2024-27802, CVE-2023-40393, CVE-2024-40842, CVE-2023-32355, CVE-2023-40448, CVE-2023-42844, CVE-2023-38259, CVE-2024-40795, CVE-2024-44198, CVE-2023-38565, CVE-2023-28205, CVE-2023-32734, CVE-2023-42924, CVE-2023-40437, CVE-2023-38604, CVE-2023-42937, CVE-2024-23224, CVE-2023-42886, CVE-2023-38603, CVE-2023-40420, CVE-2024-44125, CVE-2024-40793, CVE-2023-28202, CVE-2023-32420, CVE-2023-41984, CVE-2023-41986, CVE-2024-27805, CVE-2024-23272, CVE-2023-32409, CVE-2023-23495, CVE-2023-38258, CVE-2023-40412, CVE-2023-41060, CVE-2023-41077, CVE-2023-32399, CVE-2023-38608, CVE-2023-42891, CVE-2024-44154, CVE-2024-27836, CVE-2024-40837, CVE-2023-29497, CVE-2023-32433, CVE-2023-42947, CVE-2023-32442, CVE-2024-27795, CVE-2023-40430, CVE-2023-41070, CVE-2023-36495, CVE-2023-42872, CVE-2023-38424, CVE-2024-23276, CVE-2023-38606, CVE-2023-42832, CVE-2024-23207, CVE-2024-27806, CVE-2022-3970, CVE-2024-44190, CVE-2024-40834, CVE-2024-40806, CVE-2024-40798, CVE-2023-35990, CVE-2023-40390, CVE-2024-40797, CVE-2023-42841, CVE-2023-41981, CVE-2023-32384, CVE-2024-44158, CVE-2024-27840, CVE-2024-44149, CVE-2023-34241, CVE-2024-23274, CVE-2023-32434, CVE-2023-41063, CVE-2023-38564, CVE-2023-41975, CVE-2023-41980, CVE-2023-42856, CVE-2024-27853, CVE-2024-44191, CVE-2023-37285, CVE-2023-32392, CVE-2024-40796, CVE-2024-23204, CVE-2023-42881, CVE-2023-38592, CVE-2023-38599, CVE-2023-40395, CVE-2023-28191, CVE-2023-40416, CVE-2024-40835, CVE-2023-38403, CVE-2023-40403, CVE-2024-40850, CVE-2024-44187, CVE-2023-32357, CVE-2023-38425, CVE-2023-32395, CVE-2024-40816, CVE-2023-32383, CVE-2024-44183, CVE-2023-38596, CVE-2024-40809, CVE-2023-41071, CVE-2023-38421, CVE-2023-38571, CVE-2023-42948, CVE-2023-2953, CVE-2023-28206, CVE-2023-40454, CVE-2023-42935, CVE-2023-42893, CVE-2024-27800, CVE-2024-23270, CVE-2024-40791, CVE-2023-32369, CVE-2024-40804, CVE-2023-41066, CVE-2023-38586, CVE-2024-27883, CVE-2023-32400, CVE-2023-38615, CVE-2024-40794, CVE-2023-42870, CVE-2023-28321, CVE-2023-35983, CVE-2023-38597, CVE-2024-40789, CVE-2024-40823, CVE-2024-44178, CVE-2024-40857, CVE-2024-44166, CVE-2023-38590, CVE-2023-41996, CVE-2024-40826, CVE-2024-27877, CVE-2024-23299, CVE-2023-42854, CVE-2023-42831, CVE-2023-41993, CVE-2023-32402, CVE-2024-40778, CVE-2023-37448, CVE-2023-40421, CVE-2023-42931, CVE-2024-40859, CVE-2024-44184, CVE-2023-38261, CVE-2023-39434, CVE-2024-27882, CVE-2023-28319, CVE-2023-40436, CVE-2024-40838, CVE-2023-28322, CVE-2023-41987, CVE-2023-38605, CVE-2023-32377, CVE-2023-32376, CVE-2023-32444, CVE-2023-32373, CVE-2023-40449, CVE-2024-23267, CVE-2023-42894, CVE-2024-44163, CVE-2024-40847, CVE-2024-27871, CVE-2023-34352, CVE-2024-23225, CVE-2024-44170, CVE-2023-40452, CVE-2024-40827, CVE-2023-42922, CVE-2024-40846, CVE-2023-42929, CVE-2024-40856, CVE-2023-32397, CVE-2023-42936, CVE-2023-32413, CVE-2023-40439, CVE-2023-32375, CVE-2023-40397, CVE-2024-23222, CVE-2023-42919, CVE-2023-28204, CVE-2023-40401, CVE-2023-40400, CVE-2023-42913, CVE-2023-42934, CVE-2023-42869, CVE-2023-37450, CVE-2024-44153, CVE-2024-40817, CVE-2023-40386, CVE-2024-27873, CVE-2024-27880, CVE-2024-40844, CVE-2024-27855, CVE-2023-4733, CVE-2023-40411, CVE-2023-41991, CVE-2023-32654, CVE-2023-42887, CVE-2023-36854, CVE-2023-32423, CVE-2023-32412, CVE-2023-42930, CVE-2023-42892, CVE-2023-30774, CVE-2024-27861, CVE-2023-32415, CVE-2023-41074, CVE-2001-0102, CVE-2024-23212, CVE-2023-27940, CVE-2023-38133, CVE-2023-41079, CVE-2023-42876, CVE-2024-27887, CVE-2023-32360, CVE-2023-41994, CVE-2024-44152, CVE-2023-41254, CVE-2024-44135, CVE-2024-40833, CVE-2023-22809, CVE-2024-44165, CVE-2024-40843, CVE-2023-32421, CVE-2023-41065, CVE-2023-32379, CVE-2024-23206, CVE-2023-32401, CVE-2023-42943, CVE-2024-44161, CVE-2023-42896, CVE-2024-27823, CVE-2024-40822, CVE-2024-23266, CVE-2023-42826, CVE-2024-27792, CVE-2024-40788, CVE-2024-44151, CVE-2023-27930, CVE-2023-41232, CVE-2024-40786, CVE-2023-38580, CVE-2023-32408, CVE-2023-38612, CVE-2023-32394, CVE-2023-42849, CVE-2023-42949, CVE-2023-40410, CVE-2023-32381, CVE-2023-32386, CVE-2024-27860, CVE-2023-32389, CVE-2024-44181, CVE-2023-40422, CVE-2024-23275, CVE-2023-40424, CVE-2024-27881, CVE-2024-27863, CVE-2023-32352, CVE-2023-40427, CVE-2023-40385, CVE-2024-40860
heuristics/report_references/directly_referencing NSCIB-CC-0313985-CR, BSI-DSZ-CC-1149-V2-2023 None
heuristics/report_references/indirectly_referencing NSCIB-CC-0313985-CR, BSI-DSZ-CC-1149-2022, BSI-DSZ-CC-1149-V2-2023 None
heuristics/scheme_data/cert_id ANSSI-CC-2023/12-R01 ANSSI-CC-2023/61
heuristics/scheme_data/description Le produit évalué est « ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration, Version 4.0.1.52 » développé par NXP SEMICONDUCTORS. Ce produit offre des services d’authentification et de signature électronique (SSCD). Le produit évalué est « Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1, macOS Ventura 13.3.1 (build 22E261) » développé par APPLE INC.
heuristics/scheme_data/developer NXP SEMICONDUCTORS APPLE INC.
heuristics/scheme_data/enhanced/augmented ALC_DVS.2, AVA_VAN.5 ADV_FSP.3
heuristics/scheme_data/enhanced/category Cartes à puce Divers
heuristics/scheme_data/enhanced/cert_id ANSSI-CC-2023/12-R01 ANSSI-CC-2023/61
heuristics/scheme_data/enhanced/cert_link https://cyber.gouv.fr/sites/default/files/document_type/certificat-2023_12-R01fr.pdf https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_61en.pdf
heuristics/scheme_data/enhanced/certification_date 09/02/2024 28/12/2023
heuristics/scheme_data/enhanced/developer NXP SEMICONDUCTORS APPLE INC.
heuristics/scheme_data/enhanced/expiration_date 09/02/2029 28/12/2028
heuristics/scheme_data/enhanced/level EAL5+ EAL2+
heuristics/scheme_data/enhanced/protection_profile Protection profiles for secure signature creation device Part 2 : Device with key generation, v2.0.1, BSI-CC-PP-0059-2009-MA-02 Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01
heuristics/scheme_data/enhanced/report_link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_12-R01fr.pdf https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_61en.pdf
heuristics/scheme_data/enhanced/sponsor NXP SEMICONDUCTORS APPLE INC.
heuristics/scheme_data/enhanced/target_link https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-Cible-CC-2023_12-R01en.pdf https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_61en.pdf
heuristics/scheme_data/expiration_date 9 Février 2029 28 Décembre 2028
heuristics/scheme_data/level EAL5+ EAL2+
heuristics/scheme_data/product ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration (Version 4.0.1.52) Strong Customer Authentication for Apple Pay on Mac mini with M2 and Magic keyboard with Touch ID, running macOS Ventura 13.3.1 macOS Ventura 13.3.1 (build 22E261)
heuristics/scheme_data/sponsor NXP SEMICONDUCTORS APPLE INC.
heuristics/scheme_data/url https://cyber.gouv.fr/produits-certifies/chipdoc-v4-jcop-45-p71-sscd-configuration-version-40152 https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-mac-mini-m2-and-magic-keyboard-touch-id
heuristics/st_references/directly_referencing BSI-DSZ-CC-1149-V2-2023 None
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-1149-V2-2023 None
pdf_data/cert_filename certificat-2023_12-R01fr.pdf certificat-CC-2023_61en.pdf
pdf_data/cert_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/12-R01: 2
  • ANSSI-CC-2023/61: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0075-2012-MA01: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
  • AVA:
    • AVA_VAN.5: 1
  • ADV:
    • ADV_FSP.3: 1
pdf_data/cert_keywords/cc_security_level/EAL
  • EAL5: 1
  • EAL2: 1
  • EAL2: 2
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 1 2
pdf_data/cert_keywords/eval_facility/Thales/THALES/CNES 1 2
pdf_data/cert_keywords/os_name
  • JCOP:
    • JCOP 4: 1
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP: 2
pdf_data/cert_metadata//CreationDate D:20240214225528+01'00' D:20240222154936+01'00'
pdf_data/cert_metadata//ModDate D:20240214231041+01'00' D:20240222155209+01'00'
pdf_data/cert_metadata/pdf_file_size_bytes 165401 136188
pdf_data/report_filename ANSSI-CC-2023_12-R01fr.pdf ANSSI-CC-2023_61en.pdf
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1149-V2-2023: 1
  • FR:
    • ANSSI-CC-2023/12-R01: 2
  • NL:
    • NSCIB-CC-0313985-CR: 1
    • NSCIB-CC-0313985-1MA2: 1
  • FR:
    • ANSSI-CC-2023/61: 2
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/12-R01: 2
  • ANSSI-CC-2023/61: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 2
    • BSI-CC-PP-0075-2012-MA-01: 2
    • BSI-CC-PP-0071-2012-MA-01: 2
    • BSI-CC-PP-0072-2012-MA-01: 2
    • BSI-CC-PP-0076-2013-MA-01: 2
  • other:
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
    • PP-SSCD-Part4: 2
    • PP-SSCD-Part5: 2
    • PP-SSCD-Part6: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
    • AVA_VAN: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 1
  • ALC_FLR: 1
  • ALC_FLR: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL5: 1
  • EAL2: 2
  • EAL7: 1
  • EAL2: 3
  • EAL4: 1
  • EAL2 augmented: 1
pdf_data/report_keywords/cc_security_level/EAL/EAL2 2 3
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E6 Elevé: 1
  • ITSEC E3 Basic: 1
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • Thales:
    • THALES/CNES: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 4: 7
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 5
    • NXP Semiconductors: 1
pdf_data/report_metadata//CreationDate D:20240214225643+01'00' D:20240222155049+01'00'
pdf_data/report_metadata//ModDate D:20240214231040+01'00' D:20240222155208+01'00'
pdf_data/report_metadata/pdf_file_size_bytes 362917 396092
pdf_data/report_metadata/pdf_number_of_pages 14 13
pdf_data/st_filename ANSSI-Cible-CC-2023_12-R01en.pdf ANSSI-cible-CC-2023_61en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA-PSS: 1
  • ECC:
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 3
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 3
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1149-V2-2023: 2
pdf_data/st_keywords/cc_claims
  • D:
    • D.OS: 17
    • D.SEP_SE: 3
  • T:
    • T.COR-: 1
    • T.PHYSI-: 1
    • T.RE-: 1
    • T.REPLAY: 2
    • T.SILENT: 2
    • T.SKIM-: 1
    • T.USURP: 2
    • T.SKIMMING: 1
    • T.RECOVER: 1
    • T.CORRUPT: 1
    • T.PHYSICAL: 1
  • A:
    • A.DEVICE_AUTH: 3
    • A.PERSO: 3
    • A.WATCH_USER: 3
    • A.NO_EVIL_ROOT_USER: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-02: 1
    • BSI-CC-PP-0075-2012-MA-01: 1
    • BSI-CC-PP-0071-2012-MA-01: 1
    • BSI-CC-PP-0072-2012-MA-01: 1
    • BSI-CC-PP-0076-2013-MA-01: 1
    • BSI-CC-PP-0056-V2-2012-MA-02: 1
    • BSI-CC-PP-0086: 1
    • BSI-CC-PP-0068-: 1
    • BSI-CC-PP-0055: 1
    • BSI-CC-PP-0087-V2-MA-01: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 5
  • ADV_FSP.5: 6
  • ADV_IMP.1: 5
  • ADV_INT.2: 2
  • ADV_TDS.4: 8
  • ADV_FSP.4: 1
  • ADV_TDS.3: 1
  • ADV_FSP: 1
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 5 3
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 5 4
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 6
  • ALC_CMC.4: 2
  • ALC_CMS.5: 1
  • ALC_DEL.1: 2
  • ALC_LCD.1: 3
  • ALC_TAT.2: 3
  • ALC_DVS.1: 1
  • ALC_TAT.1: 1
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
pdf_data/st_keywords/cc_sar/ASE
  • ASE_INT.1: 4
  • ASE_CCL.1: 2
  • ASE_SPD.1: 1
  • ASE_OBJ.2: 3
  • ASE_ECD.1: 1
  • ASE_REQ.2: 4
  • ASE_TSS.1: 2
  • ASE_CCL.1: 2
  • ASE_ECD.1: 3
  • ASE_INT.1: 2
  • ASE_OBJ.2: 2
  • ASE_REQ.2: 2
  • ASE_SPD.1: 2
  • ASE_TSS.1: 2
  • ASE_REQ.1: 2
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 1 3
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 4 2
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 3 2
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 4 2
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 1 2
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 4
  • ATE_DPT.3: 1
  • ATE_FUN.1: 3
  • ATE_IND.2: 1
  • ATE_DPT.1: 1
  • ATE_COV.1: 4
  • ATE_FUN.1: 3
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.5: 4
  • AVA_VAN.2: 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5: 8
  • EAL5 augmented: 4
  • EAL 2: 1
  • EAL2: 1
  • EAL 2 augmented: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 5
    • FAU_GEN: 1
    • FAU_SAS.1: 11
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RND: 5
    • FCS_RND.1: 17
    • FCS_CKM.1: 3
    • FCS_RND.1.1: 2
    • FCS_CKM: 52
    • FCS_CKM.4: 2
    • FCS_COP: 58
    • FCS_COP.1: 2
  • FDP:
    • FDP_SDC: 10
    • FDP_SDC.1: 6
    • FDP_SDI: 5
    • FDP_SDC.1.1: 1
    • FDP_ACF: 22
    • FDP_RIP: 28
    • FDP_ACC: 22
    • FDP_ACC.1: 5
    • FDP_ACF.1: 22
    • FDP_DAU: 3
    • FDP_DAU.2: 2
    • FDP_ITC: 2
    • FDP_ITC.1: 3
    • FDP_UCT: 11
    • FDP_UCT.1: 2
    • FDP_UIT: 9
    • FDP_UIT.1: 4
    • FDP_RIP.1: 4
    • FDP_SDI.2: 4
  • FIA:
    • FIA_API: 24
    • FIA_SOS.2: 1
    • FIA_UAU.4: 2
    • FIA_UAU: 96
    • FIA_AFL: 34
    • FIA_AFL.1: 5
    • FIA_API.1: 3
    • FIA_UID: 39
    • FIA_UID.1: 6
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.5: 2
    • FIA_UAU.6: 1
  • FMT:
    • FMT_LIM: 4
    • FMT_LIM.1: 12
    • FMT_LIM.2: 11
    • FMT_LIM.1.1: 2
    • FMT_LIM.2.1: 2
    • FMT_MTD: 98
    • FMT_MOF: 7
    • FMT_MOF.1: 3
    • FMT_MTD.1: 6
    • FMT_MSA: 18
    • FMT_MSA.1: 4
    • FMT_MSA.2: 1
    • FMT_MSA.3: 9
    • FMT_MSA.4: 2
    • FMT_MTD.3: 9
    • FMT_MTD.3.1: 1
    • FMT_SMF: 22
    • FMT_SMF.1: 3
    • FMT_SMR: 20
    • FMT_SMR.1: 4
  • FPT:
    • FPT_EMS: 12
    • FPT_LIM: 1
    • FPT_LIM.1: 1
    • FPT_LIM.2: 1
    • FPT_TST.1: 7
    • FPT_EMS.1: 5
    • FPT_FLS.1: 4
    • FPT_FLS.1.1: 1
    • FPT_TST: 8
    • FPT_FLS: 11
    • FPT_PHP.1: 2
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 3
    • FPT_PHP.3.1: 1
    • FPT_PHP: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 30
    • FTP_ITC.1: 6
  • FDP:
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_ACC: 25
    • FDP_ACC.2: 4
    • FDP_ACF: 23
    • FDP_ACF.1: 12
    • FDP_ETC: 8
    • FDP_ETC.2.1: 2
    • FDP_ETC.2.2: 2
    • FDP_ETC.2.3: 2
    • FDP_ETC.2.4: 2
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC: 4
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT: 8
    • FDP_ITT.1.1: 2
    • FDP_UCT: 10
    • FDP_UCT.1: 1
    • FDP_UIT: 10
    • FDP_UIT.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_RIP.1: 13
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 9
    • FDP_SDI.1.1: 1
    • FDP_ACC.1: 13
    • FDP_IFC.1: 10
    • FDP_ETC.2: 2
  • FIA:
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 11
    • FIA_AFL.1: 3
    • FIA_AFL: 7
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_UAU.6.1: 2
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS.2: 4
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 2
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 1
  • FPR:
    • FPR_UNO.1: 17
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_RPL: 10
    • FPT_RPL.1: 4
  • FTP:
    • FTP_ITC: 14
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_SDC: 10
  • FDP_SDC.1: 6
  • FDP_SDI: 5
  • FDP_SDC.1.1: 1
  • FDP_ACF: 22
  • FDP_RIP: 28
  • FDP_ACC: 22
  • FDP_ACC.1: 5
  • FDP_ACF.1: 22
  • FDP_DAU: 3
  • FDP_DAU.2: 2
  • FDP_ITC: 2
  • FDP_ITC.1: 3
  • FDP_UCT: 11
  • FDP_UCT.1: 2
  • FDP_UIT: 9
  • FDP_UIT.1: 4
  • FDP_RIP.1: 4
  • FDP_SDI.2: 4
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 4
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_ITT: 8
  • FDP_ITT.1.1: 2
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 13
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 9
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 13
  • FDP_IFC.1: 10
  • FDP_ETC.2: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 22 25
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 5 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 22 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 22 12
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC 2 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 4 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT 11 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT.1 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 9 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 4 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API: 24
  • FIA_SOS.2: 1
  • FIA_UAU.4: 2
  • FIA_UAU: 96
  • FIA_AFL: 34
  • FIA_AFL.1: 5
  • FIA_API.1: 3
  • FIA_UID: 39
  • FIA_UID.1: 6
  • FIA_UAU.1: 14
  • FIA_UAU.1.1: 1
  • FIA_UAU.5: 2
  • FIA_UAU.6: 1
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 11
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL.1: 3
  • FIA_AFL: 7
  • FIA_AFL.1.1: 3
  • FIA_AFL.1.2: 3
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 5
  • FIA_ATD.1.1: 2
  • FIA_SOS.2: 4
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL 34 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 5 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.2 1 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 14 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.5 2 5
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 1 11
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 6 1
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 4
  • FMT_LIM.1: 12
  • FMT_LIM.2: 11
  • FMT_LIM.1.1: 2
  • FMT_LIM.2.1: 2
  • FMT_MTD: 98
  • FMT_MOF: 7
  • FMT_MOF.1: 3
  • FMT_MTD.1: 6
  • FMT_MSA: 18
  • FMT_MSA.1: 4
  • FMT_MSA.2: 1
  • FMT_MSA.3: 9
  • FMT_MSA.4: 2
  • FMT_MTD.3: 9
  • FMT_MTD.3.1: 1
  • FMT_SMF: 22
  • FMT_SMF.1: 3
  • FMT_SMR: 20
  • FMT_SMR.1: 4
  • FMT_SMR.1: 10
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_SMF.1: 6
  • FMT_SMF.1.1: 1
  • FMT_MSA.1: 6
  • FMT_MSA.3: 11
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 2
  • FMT_MTD.1: 4
  • FMT_MTD.1.1: 1
  • FMT_MTD.3: 4
  • FMT_MTD.3.1: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 4 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 9 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 6 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.3 9 4
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 3 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 4 10
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 12
  • FPT_LIM: 1
  • FPT_LIM.1: 1
  • FPT_LIM.2: 1
  • FPT_TST.1: 7
  • FPT_EMS.1: 5
  • FPT_FLS.1: 4
  • FPT_FLS.1.1: 1
  • FPT_TST: 8
  • FPT_FLS: 11
  • FPT_PHP.1: 2
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
  • FPT_PHP.3: 3
  • FPT_PHP.3.1: 1
  • FPT_PHP: 7
  • FPT_TST.1.1: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_ITC.1: 4
  • FPT_ITC.1.1: 1
  • FPT_RPL: 10
  • FPT_RPL.1: 4
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC: 30
  • FTP_ITC.1: 6
  • FTP_ITC: 14
  • FTP_ITC.1: 7
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 4
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 30 14
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 6 7
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
    • to re- turn to its User. Note: Defending against device re-use after physical compromise is out of scope. D.User_Password D.User_Bio D.Card_Data D.Unlock_Secret* D.Keyboard_Secret D.SEP_Watch* Strong: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 190
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/crypto_scheme/MAC/MAC 5 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 4
      • SHA-256: 5
      • SHA-384: 4
      • SHA-512: 5
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG3: 6
    • EF.DG4: 6
    • EF.DG1: 3
    • EF.DG16: 3
    • EF.DG14: 2
    • EF.SOD: 1
    • EF.ChipSecurity: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 4: 117
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • physical probing: 4
  • FI:
    • physical tampering: 5
    • Physical Tampering: 3
    • malfunction: 9
    • Malfunction: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 186-4: 2
    • FIPS 46-3: 4
    • FIPS 197: 5
    • FIPS180-4: 1
    • FIPS 180-4: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#3: 1
    • PKCS#1: 3
  • BSI:
    • AIS31: 1
  • ISO:
    • ISO/IEC 14888-3: 1
  • ICAO:
    • ICAO: 32
    • ICAO-SAC: 1
  • SCP:
    • SCP03: 10
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 140-3: 1
    • FIPS 140-2: 1
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 186-4: 2
  • FIPS 46-3: 4
  • FIPS 197: 5
  • FIPS180-4: 1
  • FIPS 180-4: 1
  • FIPS PUB 46-3: 1
  • FIPS 140-3: 1
  • FIPS 140-2: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 25
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • TDES: 8
  • constructions:
    • MAC:
      • KMAC: 2
      • CMAC: 6
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 25 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 4
pdf_data/st_keywords/vendor
  • NXP:
    • NXP Semiconductors: 38
    • NXP: 122
pdf_data/st_metadata
  • pdf_file_size_bytes: 929958
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 103
  • /Title: Security Target Lite
  • /Author: NXP B.V.
  • /Subject: ChipDoc v4 on JCOP 4.5 P71 in SSCD configuration
  • /Keywords: Common Criteria, Security Target Lite, ChipDoc v4, SSCD
  • /Creator: DITA Open Toolkit 3.3.1
  • /Producer: Apache FOP Version 2.3
  • /CreationDate: D:20231010235706+02'00'
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 2390078
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /CreationDate: D:20231108164206Z
  • /Creator: Word
  • /ModDate: D:20231108164224Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] Macmini_M2_Keyboard_macOS13_SecurityTarget_v1.5.docx
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20231010235706+02'00' D:20231108164206Z
pdf_data/st_metadata//Creator DITA Open Toolkit 3.3.1 Word
pdf_data/st_metadata//Producer Apache FOP Version 2.3 Adobe Mac PDF Plug-in
pdf_data/st_metadata//Title Security Target Lite Microsoft Word - [ST] Macmini_M2_Keyboard_macOS13_SecurityTarget_v1.5.docx
pdf_data/st_metadata/pdf_file_size_bytes 929958 2390078
pdf_data/st_metadata/pdf_number_of_pages 103 51
dgst 6ee673a8fd9cbf07 7ace7bd5d375474d