Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BAE Systems Secure KVM Gen2 8560943-2
CCEVS-VR-11304-2023
Plateforme Java Card MultiApp V5.0 version 5.0
ANSSI-CC-2021/42
name BAE Systems Secure KVM Gen2 8560943-2 Plateforme Java Card MultiApp V5.0 version 5.0
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
not_valid_after 12.01.2028 14.10.2026
not_valid_before 12.01.2023 14.10.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021_42.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_42.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11304-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_42en.pdf
manufacturer BAE Systems Information and Electronic Systems, Inc. THALES DIS FRANCE SA
manufacturer_web https://www.baesystems.com https://www.thalesgroup.com/en/europe/france
security_level {} EAL6+, ALC_FLR.1
dgst 9674e40d5815c857 58725b1e960799a8
heuristics/cert_id CCEVS-VR-11304-2023 ANSSI-CC-2021/42
heuristics/cert_lab US []
heuristics/extracted_sars AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ASE_REQ.2 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 8560943, 2 5.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2022/23, ANSSI-CC-2022/10, ANSSI-CC-2022/37, ANSSI-CC-2022/53
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2022/22, ANSSI-CC-2022/12, ANSSI-CC-2022/53, ANSSI-CC-2022/11, ANSSI-CC-2022/55, ANSSI-CC-2022/54, ANSSI-CC-2022/57, ANSSI-CC-2022/56, ANSSI-CC-2022/52, ANSSI-CC-2022/23, ANSSI-CC-2022/10, ANSSI-CC-2022/37, ANSSI-CC-2022/13
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/scheme_data
heuristics/st_references/directly_referenced_by {} ANSSI-CC-2022/53
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/st_references/indirectly_referenced_by {} ANSSI-CC-2022/53
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1107-2020
heuristics/protection_profiles 42cf355b24450489, 76f8f05a35d87f59, 814f66c77bc7f33b 94167fd161e87d71
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf
pdf_data/cert_filename st_vid11304-ci.pdf certificat-anssi-cc-2021_42.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11304-2023: 1
  • FR:
    • ANSSI-CC-2021/42: 2
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-099-V2-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL6: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
pdf_data/cert_keywords/eval_facility
  • Leidos:
    • Leidos: 1
  • CEA-LETI:
    • CEA-LETI: 2
pdf_data/cert_metadata
  • /CreationDate: D:20230124105725-05'00'
  • /ModDate: D:20230124105725-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 180693
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate: D:20211018162825+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211018162825+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 293555
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11304-vr.pdf anssi-cc-2021_42.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-11304-2023
    • cert_item: for BAE Systems Secure KVM Gen2 8560943-2
    • cert_lab: US NIAP
  • FR:
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-11304-2023: 1
  • DE:
    • BSI-DSZ-CC-1107-2020: 1
  • FR:
    • ANSSI-CC-2021/42: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-V2-2020: 2
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 6: 1
    • EAL2: 2
    • EAL6+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • AGD:
    • AGD_ALP: 1
    • AGD_OPE: 4
    • AGD_PRE: 2
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_APC_EXT.1: 1
    • FDP_CDS_EXT.1: 1
    • FDP_FIL_EXT: 1
    • FDP_IPC_EXT.1: 2
    • FDP_RIP: 1
    • FDP_SPR_EXT: 1
    • FDP_SWI_EXT.3: 1
  • FTA:
    • FTA_CIN_EXT.1: 2
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 5
  • Infineon:
    • Infineon Technologies AG: 2
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 10
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 3
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • using a USB connector. This device is not switched and does not use the KVM. The handgrip is out of scope and not part of the TOE. Host PC1 and Host PC2 output HDMI using the DisplayPort dual mode feature: 2
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20211018162639+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20211018162639+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 195709
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename st_vid11304-st.pdf anssi-cible-cc-2021_42en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1107-2020: 1
  • NL:
    • CC-1: 2
    • CC-2: 3
    • CC-3: 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0068-V2-2011-MA-01: 1
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0099-V2-2020: 1
    • BSI-PP- 0055-2009: 1
    • BSI-PP-0056-V2-MA-2012: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 6+: 1
    • EAL6: 31
    • EAL6 augmented: 1
    • EAL6+: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 8
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 2
    • ADV_FSP.4: 2
    • ADV_FSP.5: 5
    • ADV_IMP: 1
    • ADV_IMP.1: 6
    • ADV_IMP.2: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 8
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 3
    • ADV_TDS.4: 7
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 7
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 4
    • ALC_TAT.1: 2
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 6
    • ATE_FUN.2: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_AFL_EXT.1: 1
    • FDP_APC_EXT: 4
    • FDP_APC_EXT.1: 14
    • FDP_CDS_EXT.1: 9
    • FDP_CDS_EXT.1.1: 2
    • FDP_FIL_EXT: 9
    • FDP_FIL_EXT.1: 3
    • FDP_IPC_EXT.1: 10
    • FDP_IPC_EXT.1.1: 1
    • FDP_IPC_EXT.1.2: 1
    • FDP_PDC_EXT: 28
    • FDP_PDC_EXT.1: 7
    • FDP_PDC_EXT.1.1: 1
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 4
    • FDP_PDC_EXT.3: 4
    • FDP_RIP: 8
    • FDP_RIP.1: 1
    • FDP_RIP_EXT.1: 7
    • FDP_RIP_EXT.1.1: 1
    • FDP_SPR_EXT: 9
    • FDP_SPR_EXT.1: 1
    • FDP_SWI_EXT.1: 7
    • FDP_SWI_EXT.1.1: 1
    • FDP_SWI_EXT.2: 9
    • FDP_SWI_EXT.2.1: 1
    • FDP_SWI_EXT.2.2: 1
    • FDP_SWI_EXT.3: 8
    • FDP_SWI_EXT.3.1: 1
    • FDP_UDF_EXT: 14
    • FDP_UDF_EXT.1: 2
  • FPT:
    • FPT_FLS_EXT.1: 7
    • FPT_FLS_EXT.1.1: 1
    • FPT_NTA_EXT.1: 7
    • FPT_NTA_EXT.1.1: 1
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 2
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 1
  • FTA:
    • FTA_CIN_EXT.1: 11
    • FTA_CIN_EXT.1.1: 1
    • FTA_CIN_EXT.1.2: 1
    • FTA_CIN_EXT.1.3: 1
  • FAU:
    • FAU_ARP.1: 15
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
    • FAU_SAS.1: 2
  • FCO:
    • FCO_NRO: 5
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM: 62
    • FCS_CKM.1: 29
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 5
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 28
    • FCS_CKM.4.1: 2
    • FCS_CMK.4: 2
    • FCS_COP: 66
    • FCS_COP.1: 31
    • FCS_COP.1.1: 5
    • FCS_RNG: 25
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 44
    • FDP_ACC.1: 20
    • FDP_ACC.2: 6
    • FDP_ACF: 39
    • FDP_ACF.1: 25
    • FDP_IFC: 24
    • FDP_IFC.1: 14
    • FDP_IFC.2: 2
    • FDP_IFF: 16
    • FDP_IFF.1: 14
    • FDP_ITC: 11
    • FDP_ITC.1: 12
    • FDP_ITC.2: 17
    • FDP_ITT.1: 2
    • FDP_RIP: 97
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_ROL: 13
    • FDP_ROL.1: 5
    • FDP_SDC.1: 2
    • FDP_SDI: 8
    • FDP_SDI.2: 4
    • FDP_UCT.1: 2
    • FDP_UIT: 6
    • FDP_UIT.1: 4
  • FIA:
    • FIA_AFL: 21
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 1
    • FIA_API.1: 2
    • FIA_ATD: 12
    • FIA_ATD.1: 3
    • FIA_UAU: 64
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6.1: 1
    • FIA_UID: 42
    • FIA_UID.1: 18
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.2: 1
    • FIA_USB: 6
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 34
    • FMT_LIM.1: 17
    • FMT_LIM.1.1: 3
    • FMT_LIM.2: 16
    • FMT_LIM.2.1: 3
    • FMT_MSA: 96
    • FMT_MSA.1: 13
    • FMT_MSA.2: 2
    • FMT_MSA.3: 21
    • FMT_MTD: 57
    • FMT_MTD.1: 13
    • FMT_MTD.3: 1
    • FMT_SMF: 78
    • FMT_SMF.1: 29
    • FMT_SMF.1.1: 2
    • FMT_SMR: 88
    • FMT_SMR.1: 38
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 4
    • FPT_EMS.1: 14
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS: 47
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 2
    • FPT_ITT: 6
    • FPT_ITT.1: 2
    • FPT_PHP: 7
    • FPT_PHP.3: 17
    • FPT_PHP.3.1: 1
    • FPT_RCV: 12
    • FPT_RCV.3: 4
    • FPT_RCV.4: 2
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 8
    • FPT_TST.1: 15
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC: 17
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 4
    • FTP_TRP.1: 7
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • A:
    • A.CAP_FILE: 3
    • A.DELETION: 3
    • A.OS-UPDATE-EVIDENCE: 3
    • A.SECURE_ACODE_MANAGEMENT: 3
    • A.VERIFICATION: 3
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 6
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 5
    • D.APP_KEYS: 1
    • D.CRYPTO: 5
    • D.JCS_CODE: 6
    • D.JCS_DATA: 8
    • D.OS-: 1
    • D.OS-UPDATE-CODE-ID: 3
    • D.OS-UPDATE_ADDITIONALCODE: 5
    • D.OS-UPDATE_DEC-KEY: 2
    • D.OS-UPDATE_SGNVER-KEY: 2
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.AES: 1
    • O.ALARM: 15
    • O.APPLET: 28
    • O.ARRAY_VIEWS_CONFID: 7
    • O.ARRAY_VIEWS_INTEG: 3
    • O.CARD-MANAGEMENT: 1
    • O.CARD_MANAGEMENT: 17
    • O.CIPHER: 10
    • O.CODE_CAP_FILE: 23
    • O.CONFID-OS-UPDATE: 3
    • O.DELETION: 4
    • O.FIREWALL: 12
    • O.GLOBAL_ARRAYS_CONFID: 9
    • O.GLOBAL_ARRAYS_INTEG: 5
    • O.INSTALL: 7
    • O.JAVAOBJECT: 68
    • O.KEY-MNGT: 6
    • O.LOAD: 11
    • O.NATIVE: 11
    • O.OBJ-DELETION: 4
    • O.OBJ_DELETION: 4
    • O.OPERATE: 15
    • O.PIN-MNGT: 6
    • O.PIN_MNGT: 4
    • O.REALLOCATION: 5
    • O.RESOURCES: 9
    • O.RND: 2
    • O.RNG: 10
    • O.SCP: 31
    • O.SECURE_AC_ACTIVATION: 4
    • O.SECURE_LOAD_ACODE: 9
    • O.SID: 13
    • O.TDES: 1
    • O.TOE_IDENTIFICATION: 6
    • O.TRANSACTION: 6
  • OE:
    • OE.CAP_FILE: 5
    • OE.CARD-: 1
    • OE.CARD-MANAGEMENT: 1
    • OE.CODE-: 1
    • OE.CODE-EVIDENCE: 10
    • OE.OS-UPDATE-ENCRYPTION: 5
    • OE.OS-UPDATE-EVIDENCE: 2
    • OE.SCP: 2
    • OE.SECURE_ACODE_MANAGEMENT: 2
    • OE.VERIFICATION: 25
  • OP:
    • OP.ARRAY_AASTORE: 3
    • OP.ARRAY_ACCESS: 7
    • OP.ARRAY_LENGTH: 3
    • OP.ARRAY_T_ALOAD: 3
    • OP.ARRAY_T_ASTORE: 3
    • OP.CREATE: 11
    • OP.DELETE_APPLET: 6
    • OP.DELETE_CAP_FILE: 4
    • OP.DELETE_CAP_FILE_APPLET: 4
    • OP.INSTANCE_FIELD: 6
    • OP.INVK_INTERFACE: 10
    • OP.INVK_VIRTUAL: 8
    • OP.JAVA: 8
    • OP.PUT: 8
    • OP.PUTFIELD: 1
    • OP.PUTSTATIC: 1
    • OP.THROW: 7
    • OP.TYPE_ACCESS: 7
  • OSP:
    • OSP.ADDITIONAL_CODE_ENCRYPTION: 3
    • OSP.ADDITIONAL_CODE_SIGNING: 3
    • OSP.ATOMIC_ACTIVATION: 3
    • OSP.RNG: 3
    • OSP.TOE_IDENTIFICATION: 3
    • OSP.VERIFICATION: 3
  • OT:
    • OT.X: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-CODE: 3
    • T.CONFID-JCS-DATA: 3
    • T.CONFID-OS-UPDATE_LOAD: 3
    • T.DELETION: 3
    • T.EXE-CODE: 6
    • T.FAKE-SGNVER-KEY: 3
    • T.INSTALL: 3
    • T.INTEG-APPLI-CODE: 6
    • T.INTEG-APPLI-DATA: 6
    • T.INTEG-JCS-CODE: 3
    • T.INTEG-JCS-DATA: 3
    • T.INTEG-OS-UPDATE_LOAD: 3
    • T.NATIVE: 3
    • T.OBJ-DELETION: 3
    • T.PHYSICAL: 3
    • T.RESOURCES: 3
    • T.SID: 6
    • T.UNAUTHORIZED_TOE_CODE_UPDATE: 3
    • T.WRONG-UPDATE-STATE: 3
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 3
  • STMicroelectronics:
    • STM: 1
  • Gemalto:
    • Gemalto: 9
  • Infineon:
    • Infineon: 17
  • Thales:
    • Thales: 42
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 29
      • AES-256: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • TDEA: 1
      • TDES: 14
      • Triple-DES: 3
    • DES:
      • DES: 20
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 3
      • KMAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 13
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 14
      • Diffie-Hellman: 5
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
      • SHA2: 1
      • SHA224: 1
    • SHA3:
      • SHA3: 2
      • SHA3-384: 1
      • SHA3-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 6
    • Key agreement: 2
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 158
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
  • RNG:
    • RND: 2
    • RNG: 36
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 3
  • SCA:
    • side channel: 2
  • FI:
    • Malfunction: 5
    • Physical Tampering: 3
    • fault induction: 2
    • malfunction: 8
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 6
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 6
    • EF.DG16: 6
    • EF.DG3: 1
    • EF.DG4: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 1
    • AIS31: 6
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 197: 1
    • FIPS180-2: 1
    • FIPS197: 5
  • ICAO:
    • ICAO: 1
  • NIST:
    • SP 800-67: 1
  • PKCS:
    • PKCS#1: 7
    • PKCS#5: 5
  • SCP:
    • SCP01: 4
    • SCP02: 4
    • SCP03: 5
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 8
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • 1, are out of the scope of the SPM as they are linked to the applet loading or deletion that is out of scope of the SPM boundaries limited to VM opcodes MultiApp V5: JCS Security Target ST Ref: D1494591_LITE: 1
    • Context, the Selected Applet Context, and the Active Applets Note: the Selected Applet context is out of scope of the VM functionalities. It is a process that occurs prior to VM start MultiApp V5: JCS Security: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 4
    • the scope because done before the JCVM entering (selection of the applet) Note: The Array View is out of scope of this modelisation ADV_SPM.1.2D For each policy covered by the formal security policy model, the: 1
pdf_data/st_metadata
  • /CreationDate: D:20230124105039-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20230124105039-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 771042
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
  • /Author: D1417544
  • /CreationDate: D:20211021152816+02'00'
  • /Creator: Microsoft® Word 2016
  • /Keywords: 28-03-2018
  • /ModDate: D:20211021152816+02'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: 1.12
  • /Title: MultiApp V4.1: JCS Security Target
  • pdf_file_size_bytes: 3796482
  • pdf_hyperlinks: https://www.ssi.gouv.fr/uploads/2021/03/anssi-guide-mecanismes_crypto-2.04.pdf
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 147
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different