This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
nShield5s Hardware Security Module Version 13.5.1 None |
Application Morpho-Citiz 32 embedded on ATMEL microcontroller AT90SC12836RCT-E microcontroller (ref.: MC32/AT58819E/1.0.1) ANSSI-CC-2007/17 |
|
---|---|---|
name | nShield5s Hardware Security Module Version 13.5.1 | Application Morpho-Citiz 32 embedded on ATMEL microcontroller AT90SC12836RCT-E microcontroller (ref.: MC32/AT58819E/1.0.1) |
category | Products for Digital Signatures | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | SG | FR |
status | active | archived |
not_valid_after | 24.09.2029 | 01.09.2019 |
not_valid_before | 24.09.2024 | 24.09.2007 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20nShield5s%20Hardware%20Security%20Module%20CC%20Certificate.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20nShield5s%20Hardware%20Security%20Module%20Certificate%20Report.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2007_17fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[DD]%20[ST]%20nShield5s%20HSM%20Security%20Target%20(SCCS%20certification)-v12.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2007_17en.pdf |
manufacturer | Entrust, Inc. | Sagem Défense Sécurité/ ATMEL Smart Card ICs |
manufacturer_web | https://www.entrust.com | https://www.sagem-ds.com/ |
security_level | EAL4+, AVA_VAN.4, ALC_FLR.2 | ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
dgst | aa3ed16ed6a5ff2f | 513536a32fd82432 |
heuristics/cert_id | ANSSI-CC-2007/17 | |
heuristics/cert_lab | [] | CEA |
heuristics/extracted_sars | ALC_FLR.2, AVA_VAN.4 | ADV_RCR.1, ADV_FSP.1, AVA_VLA.4, ALC_TAT.1, ADV_HLD.2, AGD_USR.1, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ADV_IGS.1, ADV_IMP.2, AVA_MSU.3 |
heuristics/extracted_versions | 13.5.1 | 1.0.1 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2005/20 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2005/20 |
heuristics/protection_profiles | ee319f4a624019b0 | {} |
maintenance_updates |
|
|
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-PP-2016_05 PP.pdf | {} |
pdf_data/report_filename | 2007_17fr.pdf | |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr | ||
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto | ||
pdf_data/report_keywords/pq_crypto | ||
pdf_data/report_keywords/hash_function | ||
pdf_data/report_keywords/crypto_scheme | ||
pdf_data/report_keywords/crypto_protocol | ||
pdf_data/report_keywords/randomness | ||
pdf_data/report_keywords/cipher_mode | ||
pdf_data/report_keywords/ecc_curve | ||
pdf_data/report_keywords/crypto_engine | ||
pdf_data/report_keywords/tls_cipher_suite | ||
pdf_data/report_keywords/crypto_library | ||
pdf_data/report_keywords/vulnerability | ||
pdf_data/report_keywords/side_channel_analysis | ||
pdf_data/report_keywords/technical_report_id | ||
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name | ||
pdf_data/report_keywords/os_name | ||
pdf_data/report_keywords/cplc_data | ||
pdf_data/report_keywords/ic_data_group | ||
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version | ||
pdf_data/report_keywords/javacard_api_const | ||
pdf_data/report_keywords/javacard_packages | ||
pdf_data/report_keywords/certification_process | ||
pdf_data/report_metadata |
|
|
pdf_data/st_filename | cible2007_17en.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness | ||
pdf_data/st_keywords/cipher_mode | ||
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library | ||
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/report/convert_ok | False | True |
state/report/download_ok | False | True |
state/report/extract_ok | False | True |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |