name |
CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) SAAAAR : 203742 (ANSSI-CC-2023/51) |
Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a : applet (version 3124) masquée sur ID-One Cosmo V7.0.1-a (composant Inside Secure) en configuration Standard et Basic avec correctif 075243 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
archived |
not_valid_after |
17.11.2028 |
01.09.2019 |
not_valid_before |
17.11.2023 |
12.06.2012 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_51fr.pdf |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_51fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-10fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_51en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-10en.pdf |
manufacturer |
Idemia / Infineon Technologies AG |
Oberthur Technologies / Inside Secure |
manufacturer_web |
None |
https://www.oberthur.com |
security_level |
AVA_VAN.5, ALC_FLR.1, ALC_DVS.2, EAL5+ |
EAL4+, AVA_VAN.5, ALC_DVS.2, ATE_DPT.2 |
dgst |
af9a897474f938f2 |
ba3947289ae4b518 |
heuristics/cert_id |
ANSSI-CC-2023/51 |
ANSSI-CC-2012/10 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_APD.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2 |
AGD_OPE.1, AGD_PRE.1, ADV_FSP.2, ALC_DVS.2, ADV_IMP.1, AVA_VAN.5, ATE_FUN.1, ATE_DPT.2, ADV_ARC.1, ADV_TDS.3 |
heuristics/extracted_versions |
51, 203742, 2023 |
7.0.1, 1.0.1 |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300050-01-CR |
ANSSI-CC-2009/47, ANSSI-CC-2010/38, ANSSI-CC-2010/39, ANSSI-CC-2010/37, ANSSI-CC-2010/58, ANSSI-CC-2010/36, ANSSI-CC-2011/01, ANSSI-CC-2009/46, ANSSI-CC-2010/40 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2023/06, BSI-DSZ-CC-1107-V3-2022, NSCIB-CC-2300050-01-CR |
ANSSI-CC-2009/47, BSI-DSZ-CC-0421-2008, ANSSI-CC-2010/38, ANSSI-CC-2010/39, ANSSI-CC-2009/48, BSI-DSZ-CC-0411-2007, ANSSI-CC-2009/36, ANSSI-CC-2009/46, ANSSI-CC-2010/58, ANSSI-CC-2010/36, ANSSI-CC-2011/01, ANSSI-CC-2010/40, BSI-DSZ-CC-0555-2009, ANSSI-CC-2009/11, ANSSI-CC-2010/37, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0404-2007 |
heuristics/scheme_data |
- cert_id: ANSSI-CC-2023/51
- description: Le produit évalué est « CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration), SAAAAR : 203742 » développé par IDEMIA, sur un microcontrôleur développé par INFINEON. Le produit évalué est de type « carte à puce » pouvant être utilisé en deux modes avec et sans contact. Il est destiné à être utilisé comme dispositif sécurisé de création de signature (SSCD).
- developer: IDEMIA / INFINEON TECHNOLOGIES AG
- enhanced:
- augmented: ALC_DVS.2, AVA_VAN.5, ALC_FLR.1
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r5
- cert_id: ANSSI-CC-2023/51
- cert_link: https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_51.pdf
- certification_date: 2023-11-17
- developer: IDEMIA / INFINEON TECHNOLOGIES AG
- evaluation_facility: CEA - LETI
- expiration_date: 2028-11-17
- level: EAL5+
- mutual_recognition: CCRA SOG-IS
- protection_profile: Part 2 : Device with key generation, v2.01, BSI-CC-PP-0059-2009-MA-02 ; Part 3 : Device with key import, v1.0.2, BSI-CC-PP-0075-2012-MA-01 ; Part 4 : Extension for device with key generation and trusted communication with certificate generation application, v1.0.1, BSI-CC-PP-0071-2012-MA-01 ; Part 5 : Extension for device with key generation and trusted communication with signature creation application, v1.0.1, BSI-CC-PP-0072-2012-MA-01 ; Part 6 : Extension for device with key import and trusted communication with signature creation application, v1.0.4, BSI-CC-PP-0076-2013-MA-01.
- sponsor: IDEMIA
- expiration_date: 2028-11-17
- level: EAL5+
- product: CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration) (SAAAAR : 203742)
- sponsor: IDEMIA
- url: https://cyber.gouv.fr/produits-certifies/combicao-applet-v3-id-one-cosmo-x-sscd-configuration-saaaar-203742-2
|
- cert_id: ANSSI-CC-2012/10
- description: Le produit certifié est la « Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a : applet (version 3124) masquée sur ID-One Cosmo V7.0.1-a (composant Inside Secure) en configuration Standard et Basic avec correctif 075243 ». L'applet, la plateforme et le correctif sont développés par Oberthur Technologies, le composant est développé par Inside Secure. La cible d'évaluation (TOE : Target Of
- developer: Oberthur Technologies et Inside Secure
- enhanced:
- augmented: ALC_DVS.2, ATE_DPT.2, AVA_VAN.5
- category: Cartes à puce
- cc_version: Critères Communs version 3.1r3
- cert_id: ANSSI-CC-2012/10
- certification_date: 2012-06-12
- developer: Oberthur Technologies et Inside Secure
- evaluation_facility: THALES (TCS – CNES)
- level: EAL4+
- mutual_recognition: SOG-IS CCRA
- protection_profile: BSI-PP-0005-2002 et BSI-PP-0006-2002
- report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2012-10fr.pdf
- sponsor: Oberthur Technologies
- target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2012-10en.pdf
- level: EAL4+
- product: Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a
- sponsor: Oberthur Technologies
- url: https://cyber.gouv.fr/produits-certifies/carte-ias-ecc-v101-sur-id-one-cosmo-v701
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
NSCIB-CC-2300050-01-CR |
ANSSI-CC-2011/01 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
NSCIB-CC-2300050-01-CR |
ANSSI-CC-2009/11, ANSSI-CC-2011/01, BSI-DSZ-CC-0421-2008 |
heuristics/verified_cpe_matches |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename |
Certificat-CC-2023_51fr.pdf |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.1: 2
- AVA:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: DUCLOS Charlene
- /Category:
- /Comments: ANSSI-CC-CER-F-14_v14.8
- /Company: SGDSN
- /CreationDate: D:20231129190439+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords: version x.x, révision x
- /ModDate: D:20231129190440+01'00'
- /Producer: Adobe PDF Library 23.1.175
- /SourceModified: D:20231129180432
- /Title: ANSSI-CC-2023/51
- pdf_file_size_bytes: 154979
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
ANSSI-CC-2023_51fr.pdf |
ANSSI-CC_2012-10fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, ATE_DPT.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2012/10
- cert_item: Carte IAS ECC v1.0.1 sur ID-One Cosmo v7.0.1-a : applet (version 3124) masquée sur ID-One Cosmo V7.0.1-a (composant Inside Secure) en configuration Standard et Basic avec correctif 075243
- cert_item_version: Version applet 3124 Version correctif 075243
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France Inside Secure Maxwell Building – Scottish Enterprise Technology Park - East Kilbride – Glasgow G75 0QF - Ecosse Commanditaire Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1107-V3-2022: 1
- FR:
- NL:
- NSCIB-CC-2300050-01-CR: 1
|
- FR:
- ANSSI-CC-2009_46: 1
- ANSSI-CC-2009_47: 1
- ANSSI-CC-2010_36: 2
- ANSSI-CC-2010_37: 1
- ANSSI-CC-2010_38: 2
- ANSSI-CC-2010_39: 1
- ANSSI-CC-2010_40: 1
- ANSSI-CC-2010_58: 1
- ANSSI-CC-2011_01: 7
- ANSSI-CC-2012/10: 22
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075-2012-MA-01: 2
- BSI-CC-PP-0076-2013-MA-01: 2
- BSI-PP-0084-2014: 1
- other:
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 2
|
- BSI:
- BSI-PP- 0005-2002: 1
- BSI-PP- 0006-2002: 2
- BSI-PP-0005-2002: 3
- BSI-PP-0006-2002: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- AGD:
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.2: 2
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- Oberthur:
- Oberthur Technologies: 12
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- SCP:
- SCP01: 2
- SCP02: 2
- SCP03: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: [email protected]
- /Category: SAAAAR : 203742
- /Comments: ANSSI-CC-CER-F-07_v31.5
- /Company: IDEMIA
- /CreationDate: D:20231129190516+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords: [ANSSI Crypto]
- /ModDate: D:20231129190519+01'00'
- /Producer: Adobe PDF Library 23.1.175
- /SourceModified: D:20231129180505
- /Subject: CombICAO Applet v3 on ID-One Cosmo X (SSCD Configuration)
- /Title: ANSSI-CC-2023/51
- pdf_file_size_bytes: 383136
- pdf_hyperlinks: http://www.sogis.eu/, mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /CreationDate: D:20120614094916+02'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20120618193817+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title:
- pdf_file_size_bytes: 200609
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
ANSSI-cible-CC-2023_51en.pdf |
ANSSI-CC-cible_2012-10en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0072-2012-MA-01: 1
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0068-V2-: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-: 1
- BSI-CC-PP-0076-: 1
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP0056-V2-: 1
- BSI-PP-0056: 1
- other:
- PP-SSCD2: 23
- PP-SSCD3: 23
- PP-SSCD4: 23
- PP-SSCD5: 21
- PP-SSCD6: 19
|
- BSI:
- BSI-PP-0005-2002: 1
- BSI-PP-0006-2002: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5: 2
- EAL 5 augmented: 1
- EAL4: 1
- EAL4 augmented: 1
- EAL4+: 1
- EAL5: 6
- EAL5 augmented: 4
- EAL5+: 1
|
- EAL:
- EAL 4+: 2
- EAL4: 5
- EAL4 augmented: 3
- EAL4+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 15
- ADV_FSP: 1
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 22
- ADV_IMP: 1
- ADV_IMP.1: 15
- ADV_INT: 1
- ADV_INT.2: 7
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 23
- AGD:
- AGD_OPE: 11
- AGD_OPE.1: 15
- AGD_PRE: 10
- AGD_PRE.1: 11
- AGD_PRE_PLT: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 16
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 7
- ALC_DEL: 1
- ALC_DEL.1: 6
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 16
- ALC_FLR: 2
- ALC_FLR.1: 17
- ALC_FLR.3: 1
- ALC_LCD: 1
- ALC_LCD.1: 9
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 12
- APE:
- ASE:
- ASE_APD.1: 1
- ASE_CCL: 1
- ASE_CCL.1: 15
- ASE_ECD: 1
- ASE_ECD.1: 14
- ASE_INT: 1
- ASE_INT.1: 17
- ASE_OBJ: 1
- ASE_OBJ.2: 13
- ASE_REQ: 1
- ASE_REQ.1: 2
- ASE_REQ.2: 15
- ASE_SPD: 1
- ASE_SPD.1: 8
- ASE_TSS: 1
- ASE_TSS.1: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 2
- ATE_COV.2: 8
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 7
- ATE_FUN: 1
- ATE_FUN.1: 14
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE: 10
- AGD_OPE.1: 1
- AGD_PRE: 17
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 2
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.2: 6
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 58
- FCS_CKM.1: 14
- FCS_CKM.2: 3
- FCS_CKM.4: 42
- FCS_CKM.4.1: 1
- FCS_COP: 103
- FCS_COP.1: 13
- FCS_RND: 2
- FCS_RND.1: 21
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 106
- FDP_ACC.1: 21
- FDP_ACF: 92
- FDP_ACF.1: 34
- FDP_DAU: 12
- FDP_DAU.2: 2
- FDP_IFC.1: 9
- FDP_ITC: 12
- FDP_ITC.1: 11
- FDP_ITC.2: 8
- FDP_RIP.1: 27
- FDP_RIP.1.1: 1
- FDP_SDI: 32
- FDP_SDI.2: 4
- FDP_UCT: 29
- FDP_UCT.1: 2
- FDP_UIT: 24
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 34
- FIA_AFL.1: 5
- FIA_API: 22
- FIA_API.1: 21
- FIA_API.1.1: 2
- FIA_UAU: 106
- FIA_UAU.1: 33
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 1
- FIA_UAU.5: 3
- FIA_UAU.6: 2
- FIA_UID: 31
- FIA_UID.1: 35
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 4
- FMT_LIM.1: 21
- FMT_LIM.1.1: 2
- FMT_LIM.2: 20
- FMT_LIM.2.1: 2
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA: 30
- FMT_MSA.1: 4
- FMT_MSA.2: 24
- FMT_MSA.2.1: 1
- FMT_MSA.3: 38
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 20
- FMT_MSA.4.1: 1
- FMT_MTD: 256
- FMT_MTD.1: 30
- FMT_MTD.3: 14
- FMT_MTD.3.1: 1
- FMT_SMF.1: 86
- FMT_SMF.1.1: 1
- FMT_SMR: 34
- FMT_SMR.1: 61
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 19
- FPT_EMS.1: 24
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 3
- FPT_FLS.1: 17
- FPT_FLS.1.1: 1
- FPT_PHP.1: 10
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 18
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 24
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 73
- FTP_ITC.1: 20
- FTP_TRP.1: 4
|
- FAU:
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.2: 2
- FCS_CKM.3: 2
- FCS_CKM.4: 4
- FCS_CKM.4.1: 6
- FCS_COP: 1
- FCS_COP.1: 50
- FCS_RNG: 6
- FCS_RNG.1: 5
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 4
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 10
- FDP_ACF: 1
- FDP_ACF.1: 28
- FDP_ETC: 1
- FDP_ETC.1: 6
- FDP_ITC: 1
- FDP_ITC.1: 9
- FDP_RIP: 1
- FDP_RIP.1.1: 3
- FDP_SDI: 1
- FDP_SDI.2: 4
- FDP_UCT: 1
- FDP_UCT.1: 5
- FDP_UIT: 1
- FDP_UIT.1: 14
- FIA:
- FIA_AFL: 2
- FIA_AFL.1.1: 1
- FIA_ATD: 1
- FIA_UAU: 1
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 6
- FMT_MSA.2.1: 1
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 5
- FMT_MTD.1: 5
- FMT_SMF: 1
- FMT_SMF.1: 1
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1.1: 1
- FPT:
- FPT_AMT: 1
- FPT_FLS: 1
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3.1: 1
- FPT_TEE: 2
- FPT_TST: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 8
- FTP_ITC.1: 27
- FTP_ITC.1.3: 2
- FTP_TRP: 4
- FTP_TRP.1: 7
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CGA: 6
- A.CSP: 9
- A.SCA: 5
- OE:
- OE.HID_VAD: 13
- OE.HI_VAD: 2
|
- A:
- D:
- D.APPLI: 1
- D.AUTH_CRYPTOGRAM: 1
- D.AUTH_KEYS: 7
- D.DTBS: 1
- D.EPHEMERAL_KEYS: 4
- D.ESERVICES_KEYS: 1
- D.IDENTIFICATION_DATA: 1
- D.RAD: 1
- D.SCD: 1
- D.SCD_ID: 1
- D.SM_DATA: 1
- D.STATE: 2
- D.SVD: 1
- D.TOE_AUTH_PRIVATE_KEYS: 1
- D.TOE_AUTH_PUBLIC_KEYS: 1
- OE:
|
pdf_data/st_keywords/vendor |
- Idemia:
- Infineon:
- Morpho:
- Oberthur:
|
- Oberthur:
- OBERTHUR: 8
- Oberthur Technologies: 5
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 8
- AES128: 1
- AES192: 1
- AES256: 1
- DES:
- 3DES:
- 3DES: 1
- TDES: 1
- Triple-DES: 3
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 2
- SHA-384: 1
- SHA-512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 6
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 2
- Malfunction: 5
- fault injection: 1
- malfunction: 4
- physical tampering: 6
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 3
- side channel: 2
- timing attacks: 1
- other:
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- Side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 2
- EF.DG1: 2
- EF.DG13: 1
- EF.DG16: 2
- EF.DG2: 1
- EF.DG3: 1
- EF.DG4: 1
- EF.DG5: 1
- EF.SOD: 2
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 1
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 197: 1
- ICAO:
- ISO:
- ISO/IEC 11770-2: 1
- ISO/IEC 11770-3: 1
- ISO/IEC 14443: 6
- ISO/IEC 18013: 2
- ISO/IEC 7816-4: 1
- ISO/IEC 9797-1: 1
- PKCS:
- PKCS #1: 1
- PKCS#1: 8
- PKCS#15: 2
- PKCS#3: 1
- RFC:
- SCP:
|
- BSI:
- FIPS:
- FIPS 140-2: 5
- FIPS PUB 180-2: 1
- FIPS180-2: 1
- PKCS:
- PKCS #1: 6
- PKCS#1: 4
- PKCS#15: 3
- PKCS#3: 6
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: KUMAR Prem
- /CreationDate: D:20230724165059+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20230724165059+02'00'
- /Producer: Microsoft® Word 2016
- /Title: Title
- pdf_file_size_bytes: 3724442
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 200
|
- /CreationDate: D:20111123224431+02'00'
- /Creator: PDFCreator Version 0.8.1
- /ModDate: D:20120618193841+02'00'
- /Producer: AFPL Ghostscript 8.50
- /Title:
- pdf_file_size_bytes: 907567
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 113
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |