Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58)
ANSSI-CC-2023/58
Strong Customer Authentication pour Apple Pay sur iPhone (SoC A12 Bionic) exécutant iOS 14.5.1 Version 18E212
ANSSI-CC-2022/04
name Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1iOS 16.4.1 (build 20E252) (ANSSI-CC-2023/58) Strong Customer Authentication pour Apple Pay sur iPhone (SoC A12 Bionic) exécutant iOS 14.5.1 Version 18E212
category ICs, Smart Cards and Smart Card-Related Devices and Systems Mobility
not_valid_before 2023-12-28 2022-01-19
not_valid_after 2028-12-28 2027-01-19
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_58en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_04en.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_58en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_04en.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2023_58en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_04.pdf
state/cert/convert_garbage False True
state/cert/pdf_hash aa1308aebbe2495a638eab65bd5e80db992bed1e7718aa13053a75e4cbdfe30c 382f5d45de99a3624cc8f9aadd256c1883571b9abef07518c501c03f71d846ba
state/cert/txt_hash 5ed497c7602db8e0121211a132cad0cf0313a2fcb02e53227b0a7b2dc56c748c 17df450f4d37bca3e2c01d67d26e839f5d3fcbeffd5c7e97d17e28a7dc2937ee
state/report/pdf_hash 14df361cd1dca720cf1ee0b52c5e1c240be46753fa00cacc4bc3b026cb34a295 df32cc58c75549dffafdcb4659ff866b488df45af9fd14f824940584ef74ef0a
state/report/txt_hash 07c310aa55f4c1fcdc4dacba2631a1261617724d162b09969db735d1fe3d8149 e89a733ca54ee7dec2fdc7f426dbe95f18d4cd03a8ee9ee9e732698d4b868ee8
state/st/pdf_hash 26c0804b543be2fcfd21ebba6f61d67ab3a2210e1ad677b066559fbeb4ddd088 994e6fa8309eb5fde2f80fc08cf50498af1f740bf3e535e07721ba45a0f415d9
state/st/txt_hash 195057752a39cb59cdd8d30e8f4016804141ba865d6b474fce016369226d4a33 e884197913e3c2acfce142a7947941b0e37c61309bd325b84932f27e0993a43d
heuristics/cert_id ANSSI-CC-2023/58 ANSSI-CC-2022/04
heuristics/cpe_matches cpe:2.3:o:apple:iphone_os:16.4.1:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:14.5.1:*:*:*:*:*:*:*
heuristics/extracted_versions 16.4.1 14.5.1
heuristics/scheme_data
  • product: Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1 (iOS 16.4.1 (build 20E252))
  • url: https://cyber.gouv.fr/produits-certifies/strong-customer-authentication-apple-pay-iphone-se-3rd-generation-a15-bionic
  • description: Le produit évalué est « Strong Customer Authentication for Apple Pay on iPhone SE (3rd generation) with A15 Bionic running iOS 16.4.1, iOS 16.4.1 (build 20E252) » développé par APPLE INC.
  • sponsor: APPLE INC.
  • developer: APPLE INC.
  • cert_id: ANSSI-CC-2023/58
  • level: EAL2+
  • expiration_date: 28 Décembre 2028
  • enhanced:
    • cert_id: ANSSI-CC-2023/58
    • certification_date: 28/12/2023
    • expiration_date: 28/12/2028
    • category: Divers
    • cc_version: Critères Communs version 3.1r5
    • developer: APPLE INC.
    • sponsor: APPLE INC.
    • evaluation_facility: THALES / CNES
    • level: EAL2+
    • protection_profile:
    • mutual_recognition: CCRA SOG-IS
    • augmented: ADV_FSP.3
    • report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_58en.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_58en.pdf
    • cert_link: https://cyber.gouv.fr/sites/default/files/document_type/certificat-CC-2023_58en.pdf
None
pdf_data/cert_filename certificat-CC-2023_58en.pdf certificat-anssi-cc-2022_04.pdf
pdf_data/cert_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/58: 2
  • ANSSI-CC-2022/04: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.3: 1
  • ADV:
    • ADV_FSP.3: 1
  • ALC:
    • ALC_FLR.3: 1
pdf_data/cert_keywords/cc_security_level/EAL
  • EAL2: 2
  • EAL 2: 1
  • EAL2: 1
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 2 1
pdf_data/cert_keywords/eval_facility
  • Thales:
    • THALES/CNES: 2
pdf_data/cert_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/cert_metadata
  • pdf_file_size_bytes: 138204
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /CreationDate: D:20240222154440+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155211+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 281961
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Title: ANSSI-CC-2022/04
  • /Author: DUCLOS Charlene
  • /Keywords: version x.x, révision x
  • /Creator: Microsoft® Word 2019
  • /CreationDate: D:20220126105540+01'00'
  • /ModDate: D:20220126105540+01'00'
  • /Producer: Microsoft® Word 2019
  • pdf_hyperlinks:
pdf_data/cert_metadata//CreationDate D:20240222154440+01'00' D:20220126105540+01'00'
pdf_data/cert_metadata//Creator Acrobat PDFMaker 23 pour Word Microsoft® Word 2019
pdf_data/cert_metadata//Keywords version x.x, révision x
pdf_data/cert_metadata//ModDate D:20240222155211+01'00' D:20220126105540+01'00'
pdf_data/cert_metadata//Producer Adobe PDF Library 23.1.175 Microsoft® Word 2019
pdf_data/cert_metadata/pdf_file_size_bytes 138204 281961
pdf_data/report_filename ANSSI-CC-2023_58en.pdf anssi-cc-2022_04en.pdf
pdf_data/report_keywords/cc_cert_id/FR
  • ANSSI-CC-2023/58: 2
  • ANSSI-CC 2022/04: 2
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.3 1 2
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR: 1
  • ALC_FLR.3: 2
  • ALC_FLR: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL4: 1
  • EAL2 augmented: 1
  • EAL 2: 2
  • EAL2: 3
  • EAL4: 1
  • EAL 2 augmented: 2
  • EAL2 augmented: 2
pdf_data/report_keywords/cc_security_level/EAL/EAL2 augmented 1 2
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E3 Basic: 1
  • ITSEC E3 Elementary: 1
pdf_data/report_keywords/eval_facility
  • Thales:
    • THALES/CNES: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-001: 1
  • CCMB-2017-04-002: 1
  • CCMB-2017-04-003: 1
  • CCMB-2017-04-004: 1
pdf_data/report_keywords/tee_name/IBM/SE 12 2
pdf_data/report_metadata
  • pdf_file_size_bytes: 453717
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /CreationDate: D:20240222154309+01'00'
  • /Creator: Acrobat PDFMaker 23 pour Word
  • /Keywords:
  • /ModDate: D:20240222155212+01'00'
  • /Producer: Adobe PDF Library 23.1.175
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
  • pdf_file_size_bytes: 1082904
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /Author: Julie CHUZEL
  • /CreationDate: D:20220413093337+02'00'
  • /ModDate: D:20220413093337+02'00'
  • /Producer: Microsoft: Print To PDF
  • /Title: Microsoft Word - ANSSI-CC-2022_04en.docx
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20240222154309+01'00' D:20220413093337+02'00'
pdf_data/report_metadata//ModDate D:20240222155212+01'00' D:20220413093337+02'00'
pdf_data/report_metadata//Producer Adobe PDF Library 23.1.175 Microsoft: Print To PDF
pdf_data/report_metadata/pdf_file_size_bytes 453717 1082904
pdf_data/report_metadata/pdf_hyperlinks mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
pdf_data/st_filename ANSSI-cible-CC-2023_58en.pdf anssi-cible-cc-2022_04en.pdf
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
pdf_data/st_keywords/cc_claims/A
  • A.DEVICE_AUTH: 2
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.DE-: 1
  • A.DEVICE_AUTH: 3
  • A.PERSO: 3
  • A.CDCVM: 3
  • A.WATCH_USER: 3
pdf_data/st_keywords/cc_claims/A/A.DEVICE_AUTH 2 3
pdf_data/st_keywords/cc_claims/T
  • T.COR-: 1
  • T.PHYSI-: 1
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIM-: 1
  • T.USURP: 2
  • T.SKIMMING: 1
  • T.CORRUPT: 1
  • T.PHYSICAL: 1
  • T.CORRUPT: 2
  • T.PHYSICAL: 2
  • T.RECOVER: 2
  • T.REPLAY: 2
  • T.SILENT: 2
  • T.SKIMMING: 2
  • T.USURP: 2
pdf_data/st_keywords/cc_claims/T/T.CORRUPT 1 2
pdf_data/st_keywords/cc_claims/T/T.PHYSICAL 1 2
pdf_data/st_keywords/cc_claims/T/T.SKIMMING 1 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP: 1
  • ADV_ARC.1: 3
  • ADV_FSP.3: 2
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
  • ADV_FSP.3: 3
  • ADV_ARC.1: 3
  • ADV_TDS.1: 4
  • ADV_FSP.2: 4
  • ADV_FSP.1: 2
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.3 2 3
pdf_data/st_keywords/cc_sar/ALC
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR: 1
  • ALC_CMC.2: 2
  • ALC_CMS.2: 2
  • ALC_DEL.1: 2
  • ALC_FLR.3: 3
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 1 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 23
  • FDP_ACC.2: 4
  • FDP_ACF: 19
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 4
  • FDP_UCT.1: 1
  • FDP_UIT: 4
  • FDP_UIT.1: 2
  • FDP_RIP.1: 15
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 10
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 9
  • FDP_IFC.1: 7
  • FDP_ETC.2: 2
  • FDP_DAU.1: 4
  • FDP_DAU.1.1: 1
  • FDP_DAU.1.2: 1
  • FDP_ACC: 25
  • FDP_ACC.2: 4
  • FDP_ACF: 23
  • FDP_ACF.1: 12
  • FDP_ITT.1: 4
  • FDP_ITT.1.1: 1
  • FDP_ETC: 8
  • FDP_ETC.2.1: 2
  • FDP_ETC.2.2: 2
  • FDP_ETC.2.3: 2
  • FDP_ETC.2.4: 2
  • FDP_ACC.2.1: 1
  • FDP_ACC.2.2: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC: 5
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_UCT: 10
  • FDP_UCT.1: 1
  • FDP_UIT: 10
  • FDP_UIT.1: 2
  • FDP_UCT.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_RIP.1: 15
  • FDP_RIP.1.1: 1
  • FDP_SDI.1: 10
  • FDP_SDI.1.1: 1
  • FDP_ACC.1: 11
  • FDP_IFC.1: 9
  • FDP_ETC.2: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 23 25
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 9 11
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 19 23
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 7 9
pdf_data/st_keywords/cc_sfr/FDP/FDP_UCT 4 10
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT 4 10
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 11
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL.1: 3
  • FIA_AFL: 7
  • FIA_AFL.1.1: 3
  • FIA_AFL.1.2: 3
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 4
  • FIA_ATD.1.1: 2
  • FIA_UAU.1: 1
  • FIA_UID.1: 1
  • FIA_UID.2: 6
  • FIA_UID.2.1: 1
  • FIA_UAU.2: 11
  • FIA_UAU.2.1: 1
  • FIA_UAU.5: 5
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.6: 11
  • FIA_AFL.1: 3
  • FIA_AFL: 7
  • FIA_AFL.1.1: 3
  • FIA_AFL.1.2: 3
  • FIA_UAU.6.1: 2
  • FIA_ATD.1: 5
  • FIA_ATD.1.1: 2
  • FIA_SOS.2: 4
  • FIA_SOS.2.1: 1
  • FIA_SOS.2.2: 1
  • FIA_UAU.1: 1
  • FIA_UID.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 4 5
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 5 6
pdf_data/st_keywords/cc_sfr/FPR/FPR_UNO.1 11 14
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL 4 8
pdf_data/st_keywords/cc_sfr/FPT/FPT_RPL.1 2 6
pdf_data/st_keywords/cc_sfr/FTP
  • FTP_ITC: 6
  • FTP_ITC.1: 5
  • FTP_TRP.1: 2
  • FTP_ITC: 14
  • FTP_ITC.1: 7
  • FTP_ITC.1.1: 1
  • FTP_ITC.1.2: 1
  • FTP_ITC.1.3: 1
  • FTP_TRP.1: 4
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC 6 14
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 5 7
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 2 4
pdf_data/st_keywords/certification_process/OutOfScope
  • out of scope: 2
  • Element of the device is separately certified according to the Common Criteria and is there- fore out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • to return to its User. Note: Defending against device re-use after physical com- promise is out of scope. D.User_Passcode D.User_Bio D.Card_Data T.RECOVER Card Re- covery An attacker attempts to recover: 1
  • out of scope: 2
  • SE) of the device is out of scope of this evaluation: 1
  • for the device, operating system and applications. The Secure Element (SE) of the device is out of scope of this evaluation. Note: In the evaluated configuration the cryptographic modules are supplied by: 1
  • pected to return to its User. Note: Defending against device re-use after physi- cal compromise is out of scope. D.User_Passcode D.User_Bio D.Card_Data D.Unlock_Secret* D.SEP_Watch* T.RECOVER Card Re- covery An: 1
pdf_data/st_keywords/crypto_scheme/MAC/MAC 1 4
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 2
pdf_data/st_keywords/standard_id/FIPS
  • FIPS 140-3: 1
  • FIPS 140-2: 2
pdf_data/st_keywords/tee_name/IBM/SE 66 72
pdf_data/st_metadata
  • pdf_file_size_bytes: 2448380
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /CreationDate: D:20231108181326Z
  • /Creator: Word
  • /ModDate: D:20231108181351Z
  • /Producer: Adobe Mac PDF Plug-in
  • /Title: Microsoft Word - [ST] iPhone_A15Bionic_iPhoneSE3_iOS16_SecurityTarget_v1.4.docx
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 2074656
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
  • /Producer: macOS Version 11.6 (Build 20G165) Quartz PDFContext
  • /Author: ThanhHaLe
  • /Creator: Word
  • /CreationDate: D:20211123130559Z00'00'
  • /ModDate: D:20211123130559Z00'00'
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20231108181326Z D:20211123130559Z00'00'
pdf_data/st_metadata//ModDate D:20231108181351Z D:20211123130559Z00'00'
pdf_data/st_metadata//Producer Adobe Mac PDF Plug-in macOS Version 11.6 (Build 20G165) Quartz PDFContext
pdf_data/st_metadata/pdf_file_size_bytes 2448380 2074656
pdf_data/st_metadata/pdf_number_of_pages 51 54
dgst a5696b3d01538604 b640b48f401c05c3